Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-21806 (GCVE-0-2021-21806)
Vulnerability from cvelistv5
Published
2021-07-08 11:06
Modified
2024-08-03 18:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- use-after-free
Summary
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | http://www.openwall.com/lists/oss-security/2021/07/23/1 | Mailing List, Third Party Advisory | |
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/07/23/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214 | Exploit, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:23:29.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214" }, { "name": "[oss-security] 20210723 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0004", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/23/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Webkit", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Webkit WebKitGTK 2.30.3" } ] } ], "descriptions": [ { "lang": "en", "value": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "use-after-free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-23T17:06:17", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214" }, { "name": "[oss-security] 20210723 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0004", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/23/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "ID": "CVE-2021-21806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Webkit", "version": { "version_data": [ { "version_value": "Webkit WebKitGTK 2.30.3" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability." } ] }, "impact": { "cvss": { "baseScore": 8.8, "baseSeverity": "High", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "use-after-free" } ] } ] }, "references": { "reference_data": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214" }, { "name": "[oss-security] 20210723 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0004", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/07/23/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2021-21806", "datePublished": "2021-07-08T11:06:47", "dateReserved": "2021-01-04T00:00:00", "dateUpdated": "2024-08-03T18:23:29.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-21806\",\"sourceIdentifier\":\"talos-cna@cisco.com\",\"published\":\"2021-07-08T12:15:10.013\",\"lastModified\":\"2024-11-21T05:49:00.650\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad explotable de uso de la memoria previamente liberada en el navegador WebKitGTK versi\u00f3n 2.30.3 x64. Una p\u00e1gina web HTML especialmente dise\u00f1ada puede causar una condici\u00f3n de uso de memoria previamente liberada, resultando en una ejecuci\u00f3n de c\u00f3digo remota. La v\u00edctima necesita visitar un sitio web malicioso para desencadenar la vulnerabilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"talos-cna@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webkitgtk:webkitgtk:2.30.3:*:*:*:*:*:x64:*\",\"matchCriteriaId\":\"46CD70A1-7A25-402E-83BC-AB106DB2F665\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/07/23/1\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/07/23/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
opensuse-su-2021:3353-1
Vulnerability from csaf_opensuse
Published
2021-10-12 11:24
Modified
2021-10-12 11:24
Summary
Security update for webkit2gtk3
Notes
Title of the patch
Security update for webkit2gtk3
Description of the patch
This update for webkit2gtk3 fixes the following issues:
- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
Patchnames
openSUSE-SLE-15.3-2021-3353
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\n- Update to version 2.32.4\n- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)\n- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2021-3353", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3353-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:3353-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KJIY3NX4MIKAMIQIFUSKB4JVJBMJUFI/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:3353-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KJIY3NX4MIKAMIQIFUSKB4JVJBMJUFI/" }, { "category": "self", "summary": "SUSE Bug 1188697", "url": "https://bugzilla.suse.com/1188697" }, { "category": "self", "summary": "SUSE Bug 1190701", "url": "https://bugzilla.suse.com/1190701" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21806 page", "url": "https://www.suse.com/security/cve/CVE-2021-21806/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30858 page", "url": "https://www.suse.com/security/cve/CVE-2021-30858/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2021-10-12T11:24:06Z", "generator": { "date": "2021-10-12T11:24:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:3353-1", "initial_release_date": "2021-10-12T11:24:06Z", "revision_history": [ { "date": "2021-10-12T11:24:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-12.3.aarch64", "product": { "name": "webkit-jsc-4-2.32.4-12.3.aarch64", "product_id": "webkit-jsc-4-2.32.4-12.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-12.3.aarch64", "product": { "name": "webkit2gtk3-devel-2.32.4-12.3.aarch64", "product_id": "webkit2gtk3-devel-2.32.4-12.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "product_id": "webkit2gtk3-minibrowser-2.32.4-12.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libwebkit2gtk3-lang-2.32.4-12.3.noarch", "product": { "name": "libwebkit2gtk3-lang-2.32.4-12.3.noarch", "product_id": "libwebkit2gtk3-lang-2.32.4-12.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-12.3.ppc64le", "product": { "name": "webkit-jsc-4-2.32.4-12.3.ppc64le", "product_id": "webkit-jsc-4-2.32.4-12.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-12.3.ppc64le", "product": { "name": "webkit2gtk3-devel-2.32.4-12.3.ppc64le", "product_id": "webkit2gtk3-devel-2.32.4-12.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "product_id": "libwebkit2gtk-4_0-37-2.32.4-12.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-12.3.s390x", "product": { "name": "webkit-jsc-4-2.32.4-12.3.s390x", "product_id": "webkit-jsc-4-2.32.4-12.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-12.3.s390x", "product": { "name": "webkit2gtk3-devel-2.32.4-12.3.s390x", "product_id": "webkit2gtk3-devel-2.32.4-12.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "product_id": "webkit2gtk3-minibrowser-2.32.4-12.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-12.3.x86_64", "product": { "name": "webkit-jsc-4-2.32.4-12.3.x86_64", "product_id": "webkit-jsc-4-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-12.3.x86_64", "product": { "name": "webkit2gtk3-devel-2.32.4-12.3.x86_64", "product_id": "webkit2gtk3-devel-2.32.4-12.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-12.3.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-12.3.x86_64", "product_id": "webkit2gtk3-minibrowser-2.32.4-12.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.4-12.3.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.32.4-12.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.4-12.3.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.aarch64" }, "product_reference": "webkit-jsc-4-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.ppc64le" }, "product_reference": "webkit-jsc-4-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.s390x" }, "product_reference": "webkit-jsc-4-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.x86_64" }, "product_reference": "webkit-jsc-4-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.aarch64" }, "product_reference": "webkit2gtk3-devel-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.s390x" }, "product_reference": "webkit2gtk3-devel-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-12.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.aarch64" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-12.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.s390x" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-12.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.x86_64" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-12.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-21806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-21806" } ], "notes": [ { "category": "general", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.32.4-12.3.noarch", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-21806", "url": "https://www.suse.com/security/cve/CVE-2021-21806" }, { "category": "external", "summary": "SUSE Bug 1188294 for CVE-2021-21806", "url": "https://bugzilla.suse.com/1188294" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-21806", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.32.4-12.3.noarch", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.32.4-12.3.noarch", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-12T11:24:06Z", "details": "important" } ], "title": "CVE-2021-21806" }, { "cve": "CVE-2021-30858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30858" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.32.4-12.3.noarch", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30858", "url": "https://www.suse.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "SUSE Bug 1190701 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1190701" }, { "category": "external", "summary": "SUSE Bug 1191298 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191298" }, { "category": "external", "summary": "SUSE Bug 1191301 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.32.4-12.3.noarch", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.s390x", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.32.4-12.3.noarch", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.s390x", "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit-jsc-4-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-devel-2.32.4-12.3.x86_64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.aarch64", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.ppc64le", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.s390x", "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.32.4-12.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-12T11:24:06Z", "details": "important" } ], "title": "CVE-2021-30858" } ] }
opensuse-su-2024:11506-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libjavascriptcoregtk-4_0-18-2.32.4-1.1 on GA media
Notes
Title of the patch
libjavascriptcoregtk-4_0-18-2.32.4-1.1 on GA media
Description of the patch
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.32.4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11506
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libjavascriptcoregtk-4_0-18-2.32.4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.32.4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11506-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4692 page", "url": "https://www.suse.com/security/cve/CVE-2016-4692/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4743 page", "url": "https://www.suse.com/security/cve/CVE-2016-4743/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7589 page", "url": "https://www.suse.com/security/cve/CVE-2016-7589/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7598 page", "url": "https://www.suse.com/security/cve/CVE-2016-7598/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7641 page", "url": "https://www.suse.com/security/cve/CVE-2016-7641/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7654 page", "url": "https://www.suse.com/security/cve/CVE-2016-7654/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7656 page", "url": "https://www.suse.com/security/cve/CVE-2016-7656/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000121 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000121/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13798 page", "url": "https://www.suse.com/security/cve/CVE-2017-13798/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13803 page", "url": "https://www.suse.com/security/cve/CVE-2017-13803/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13866 page", "url": "https://www.suse.com/security/cve/CVE-2017-13866/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13884 page", "url": "https://www.suse.com/security/cve/CVE-2017-13884/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2350 page", "url": "https://www.suse.com/security/cve/CVE-2017-2350/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2365 page", "url": "https://www.suse.com/security/cve/CVE-2017-2365/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2371 page", "url": "https://www.suse.com/security/cve/CVE-2017-2371/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2373 page", "url": "https://www.suse.com/security/cve/CVE-2017-2373/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2496 page", "url": "https://www.suse.com/security/cve/CVE-2017-2496/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2510 page", "url": "https://www.suse.com/security/cve/CVE-2017-2510/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2538 page", "url": "https://www.suse.com/security/cve/CVE-2017-2538/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7006 page", "url": "https://www.suse.com/security/cve/CVE-2017-7006/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7019 page", "url": "https://www.suse.com/security/cve/CVE-2017-7019/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7020 page", "url": "https://www.suse.com/security/cve/CVE-2017-7020/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7030 page", "url": "https://www.suse.com/security/cve/CVE-2017-7030/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7039 page", "url": "https://www.suse.com/security/cve/CVE-2017-7039/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7043 page", "url": "https://www.suse.com/security/cve/CVE-2017-7043/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7046 page", "url": "https://www.suse.com/security/cve/CVE-2017-7046/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7052 page", "url": "https://www.suse.com/security/cve/CVE-2017-7052/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7056 page", "url": "https://www.suse.com/security/cve/CVE-2017-7056/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7081 page", "url": "https://www.suse.com/security/cve/CVE-2017-7081/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7089 page", "url": "https://www.suse.com/security/cve/CVE-2017-7089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7093 page", "url": "https://www.suse.com/security/cve/CVE-2017-7093/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7098 page", "url": "https://www.suse.com/security/cve/CVE-2017-7098/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7104 page", "url": "https://www.suse.com/security/cve/CVE-2017-7104/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7117 page", "url": "https://www.suse.com/security/cve/CVE-2017-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7156 page", "url": "https://www.suse.com/security/cve/CVE-2017-7156/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7157 page", "url": "https://www.suse.com/security/cve/CVE-2017-7157/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7161 page", "url": "https://www.suse.com/security/cve/CVE-2017-7161/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11646 page", "url": "https://www.suse.com/security/cve/CVE-2018-11646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12911 page", "url": "https://www.suse.com/security/cve/CVE-2018-12911/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4088 page", "url": "https://www.suse.com/security/cve/CVE-2018-4088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4101 page", "url": "https://www.suse.com/security/cve/CVE-2018-4101/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4117 page", "url": "https://www.suse.com/security/cve/CVE-2018-4117/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4120 page", "url": "https://www.suse.com/security/cve/CVE-2018-4120/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4127 page", "url": "https://www.suse.com/security/cve/CVE-2018-4127/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4133 page", "url": "https://www.suse.com/security/cve/CVE-2018-4133/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4162 page", "url": "https://www.suse.com/security/cve/CVE-2018-4162/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4190 page", "url": "https://www.suse.com/security/cve/CVE-2018-4190/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4191 page", "url": "https://www.suse.com/security/cve/CVE-2018-4191/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4200 page", "url": "https://www.suse.com/security/cve/CVE-2018-4200/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4204 page", "url": "https://www.suse.com/security/cve/CVE-2018-4204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4207 page", "url": "https://www.suse.com/security/cve/CVE-2018-4207/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4212 page", "url": "https://www.suse.com/security/cve/CVE-2018-4212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4222 page", "url": "https://www.suse.com/security/cve/CVE-2018-4222/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4261 page", "url": "https://www.suse.com/security/cve/CVE-2018-4261/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4264 page", "url": "https://www.suse.com/security/cve/CVE-2018-4264/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4270 page", "url": "https://www.suse.com/security/cve/CVE-2018-4270/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4284 page", "url": "https://www.suse.com/security/cve/CVE-2018-4284/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4306 page", "url": "https://www.suse.com/security/cve/CVE-2018-4306/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4315 page", "url": "https://www.suse.com/security/cve/CVE-2018-4315/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4319 page", "url": "https://www.suse.com/security/cve/CVE-2018-4319/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4345 page", "url": "https://www.suse.com/security/cve/CVE-2018-4345/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4359 page", "url": "https://www.suse.com/security/cve/CVE-2018-4359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4372 page", "url": "https://www.suse.com/security/cve/CVE-2018-4372/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4375 page", "url": "https://www.suse.com/security/cve/CVE-2018-4375/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4382 page", "url": "https://www.suse.com/security/cve/CVE-2018-4382/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4437 page", "url": "https://www.suse.com/security/cve/CVE-2018-4437/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4441 page", "url": "https://www.suse.com/security/cve/CVE-2018-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4443 page", "url": "https://www.suse.com/security/cve/CVE-2018-4443/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6212 page", "url": "https://www.suse.com/security/cve/CVE-2019-6212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6216 page", "url": "https://www.suse.com/security/cve/CVE-2019-6216/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6229 page", "url": "https://www.suse.com/security/cve/CVE-2019-6229/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6251 page", "url": "https://www.suse.com/security/cve/CVE-2019-6251/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7285 page", "url": "https://www.suse.com/security/cve/CVE-2019-7285/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8375 page", "url": "https://www.suse.com/security/cve/CVE-2019-8375/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8518 page", "url": "https://www.suse.com/security/cve/CVE-2019-8518/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8524 page", "url": "https://www.suse.com/security/cve/CVE-2019-8524/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8551 page", "url": "https://www.suse.com/security/cve/CVE-2019-8551/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8595 page", "url": "https://www.suse.com/security/cve/CVE-2019-8595/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8625 page", "url": "https://www.suse.com/security/cve/CVE-2019-8625/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8644 page", "url": "https://www.suse.com/security/cve/CVE-2019-8644/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8666 page", "url": "https://www.suse.com/security/cve/CVE-2019-8666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8669 page", "url": "https://www.suse.com/security/cve/CVE-2019-8669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8671 page", "url": "https://www.suse.com/security/cve/CVE-2019-8671/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8681 page", "url": "https://www.suse.com/security/cve/CVE-2019-8681/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8684 page", "url": "https://www.suse.com/security/cve/CVE-2019-8684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8686 page", "url": "https://www.suse.com/security/cve/CVE-2019-8686/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8719 page", "url": "https://www.suse.com/security/cve/CVE-2019-8719/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8726 page", "url": "https://www.suse.com/security/cve/CVE-2019-8726/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8766 page", "url": "https://www.suse.com/security/cve/CVE-2019-8766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8768 page", "url": "https://www.suse.com/security/cve/CVE-2019-8768/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8771 page", "url": "https://www.suse.com/security/cve/CVE-2019-8771/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8783 page", "url": "https://www.suse.com/security/cve/CVE-2019-8783/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8812 page", "url": "https://www.suse.com/security/cve/CVE-2019-8812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8816 page", "url": "https://www.suse.com/security/cve/CVE-2019-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8821 page", "url": "https://www.suse.com/security/cve/CVE-2019-8821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8835 page", "url": "https://www.suse.com/security/cve/CVE-2019-8835/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10018 page", "url": "https://www.suse.com/security/cve/CVE-2020-10018/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11793 page", "url": "https://www.suse.com/security/cve/CVE-2020-11793/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13558 page", "url": "https://www.suse.com/security/cve/CVE-2020-13558/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13584 page", "url": "https://www.suse.com/security/cve/CVE-2020-13584/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13753 page", "url": "https://www.suse.com/security/cve/CVE-2020-13753/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27918 page", "url": "https://www.suse.com/security/cve/CVE-2020-27918/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-3862 page", "url": "https://www.suse.com/security/cve/CVE-2020-3862/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-3867 page", "url": "https://www.suse.com/security/cve/CVE-2020-3867/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-3895 page", "url": "https://www.suse.com/security/cve/CVE-2020-3895/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-3899 page", "url": "https://www.suse.com/security/cve/CVE-2020-3899/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-3902 page", "url": "https://www.suse.com/security/cve/CVE-2020-3902/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9802 page", "url": "https://www.suse.com/security/cve/CVE-2020-9802/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9806 page", "url": "https://www.suse.com/security/cve/CVE-2020-9806/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9862 page", "url": "https://www.suse.com/security/cve/CVE-2020-9862/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9895 page", "url": "https://www.suse.com/security/cve/CVE-2020-9895/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9947 page", "url": "https://www.suse.com/security/cve/CVE-2020-9947/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1788 page", "url": "https://www.suse.com/security/cve/CVE-2021-1788/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1789 page", "url": "https://www.suse.com/security/cve/CVE-2021-1789/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1817 page", "url": "https://www.suse.com/security/cve/CVE-2021-1817/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21775 page", "url": "https://www.suse.com/security/cve/CVE-2021-21775/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21806 page", "url": "https://www.suse.com/security/cve/CVE-2021-21806/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30661 page", "url": "https://www.suse.com/security/cve/CVE-2021-30661/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30665 page", "url": "https://www.suse.com/security/cve/CVE-2021-30665/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30666 page", "url": "https://www.suse.com/security/cve/CVE-2021-30666/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30682 page", "url": "https://www.suse.com/security/cve/CVE-2021-30682/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30744 page", "url": "https://www.suse.com/security/cve/CVE-2021-30744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30758 page", "url": "https://www.suse.com/security/cve/CVE-2021-30758/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30799 page", "url": "https://www.suse.com/security/cve/CVE-2021-30799/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30858 page", "url": "https://www.suse.com/security/cve/CVE-2021-30858/" } ], "title": "libjavascriptcoregtk-4_0-18-2.32.4-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11506-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "product": { "name": "libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "product_id": "libwebkit2gtk3-lang-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-1.1.aarch64", "product": { "name": "webkit-jsc-4-2.32.4-1.1.aarch64", "product_id": "webkit-jsc-4-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-1.1.aarch64", "product": { "name": "webkit2gtk3-devel-2.32.4-1.1.aarch64", "product_id": "webkit2gtk3-devel-2.32.4-1.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "product_id": "webkit2gtk3-minibrowser-2.32.4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "product_id": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "product": { "name": "libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "product_id": "libwebkit2gtk3-lang-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-1.1.ppc64le", "product": { "name": "webkit-jsc-4-2.32.4-1.1.ppc64le", "product_id": "webkit-jsc-4-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-1.1.ppc64le", "product": { "name": "webkit2gtk3-devel-2.32.4-1.1.ppc64le", "product_id": "webkit2gtk3-devel-2.32.4-1.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "product_id": "libwebkit2gtk-4_0-37-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "product_id": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk3-lang-2.32.4-1.1.s390x", "product": { "name": "libwebkit2gtk3-lang-2.32.4-1.1.s390x", "product_id": "libwebkit2gtk3-lang-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-1.1.s390x", "product": { "name": "webkit-jsc-4-2.32.4-1.1.s390x", "product_id": "webkit-jsc-4-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-1.1.s390x", "product": { "name": "webkit2gtk3-devel-2.32.4-1.1.s390x", "product_id": "webkit2gtk3-devel-2.32.4-1.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "product_id": "webkit2gtk3-minibrowser-2.32.4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "product": { "name": "libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "product_id": "libwebkit2gtk3-lang-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-1.1.x86_64", "product": { "name": "webkit-jsc-4-2.32.4-1.1.x86_64", "product_id": "webkit-jsc-4-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-1.1.x86_64", "product": { "name": "webkit2gtk3-devel-2.32.4-1.1.x86_64", "product_id": "webkit2gtk3-devel-2.32.4-1.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-1.1.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-1.1.x86_64", "product_id": "webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64" }, "product_reference": "libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le" }, "product_reference": "libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x" }, "product_reference": "libwebkit2gtk3-lang-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64" }, "product_reference": "libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64" }, "product_reference": "webkit-jsc-4-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le" }, "product_reference": "webkit-jsc-4-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x" }, "product_reference": "webkit-jsc-4-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64" }, "product_reference": "webkit-jsc-4-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x" }, "product_reference": "webkit2gtk3-devel-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4692" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4692", "url": "https://www.suse.com/security/cve/CVE-2016-4692" }, { "category": "external", "summary": "SUSE Bug 1020950 for CVE-2016-4692", "url": "https://bugzilla.suse.com/1020950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4692" }, { "cve": "CVE-2016-4743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4743" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4743", "url": "https://www.suse.com/security/cve/CVE-2016-4743" }, { "category": "external", "summary": "SUSE Bug 1020950 for CVE-2016-4743", "url": "https://bugzilla.suse.com/1020950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4743" }, { "cve": "CVE-2016-7589", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7589" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. watchOS before 3.1.3 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7589", "url": "https://www.suse.com/security/cve/CVE-2016-7589" }, { "category": "external", "summary": "SUSE Bug 1020950 for CVE-2016-7589", "url": "https://bugzilla.suse.com/1020950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7589" }, { "cve": "CVE-2016-7598", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7598" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7598", "url": "https://www.suse.com/security/cve/CVE-2016-7598" }, { "category": "external", "summary": "SUSE Bug 1020950 for CVE-2016-7598", "url": "https://bugzilla.suse.com/1020950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7598" }, { "cve": "CVE-2016-7641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7641" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7641", "url": "https://www.suse.com/security/cve/CVE-2016-7641" }, { "category": "external", "summary": "SUSE Bug 1020950 for CVE-2016-7641", "url": "https://bugzilla.suse.com/1020950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7641" }, { "cve": "CVE-2016-7654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7654" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7654", "url": "https://www.suse.com/security/cve/CVE-2016-7654" }, { "category": "external", "summary": "SUSE Bug 1020950 for CVE-2016-7654", "url": "https://bugzilla.suse.com/1020950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7654" }, { "cve": "CVE-2016-7656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7656" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7656", "url": "https://www.suse.com/security/cve/CVE-2016-7656" }, { "category": "external", "summary": "SUSE Bug 1020950 for CVE-2016-7656", "url": "https://bugzilla.suse.com/1020950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7656" }, { "cve": "CVE-2017-1000121", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000121" } ], "notes": [ { "category": "general", "text": "The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000121", "url": "https://www.suse.com/security/cve/CVE-2017-1000121" }, { "category": "external", "summary": "SUSE Bug 1078996 for CVE-2017-1000121", "url": "https://bugzilla.suse.com/1078996" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-1000121" }, { "cve": "CVE-2017-13798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13798" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13798", "url": "https://www.suse.com/security/cve/CVE-2017-13798" }, { "category": "external", "summary": "SUSE Bug 1069925 for CVE-2017-13798", "url": "https://bugzilla.suse.com/1069925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13798" }, { "cve": "CVE-2017-13803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13803" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13803", "url": "https://www.suse.com/security/cve/CVE-2017-13803" }, { "category": "external", "summary": "SUSE Bug 1069925 for CVE-2017-13803", "url": "https://bugzilla.suse.com/1069925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13803" }, { "cve": "CVE-2017-13866", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13866" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13866", "url": "https://www.suse.com/security/cve/CVE-2017-13866" }, { "category": "external", "summary": "SUSE Bug 1073654 for CVE-2017-13866", "url": "https://bugzilla.suse.com/1073654" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13866" }, { "cve": "CVE-2017-13884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13884", "url": "https://www.suse.com/security/cve/CVE-2017-13884" }, { "category": "external", "summary": "SUSE Bug 1075775 for CVE-2017-13884", "url": "https://bugzilla.suse.com/1075775" }, { "category": "external", "summary": "SUSE Bug 1077535 for CVE-2017-13884", "url": "https://bugzilla.suse.com/1077535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13884" }, { "cve": "CVE-2017-2350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2350" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2350", "url": "https://www.suse.com/security/cve/CVE-2017-2350" }, { "category": "external", "summary": "SUSE Bug 1024749 for CVE-2017-2350", "url": "https://bugzilla.suse.com/1024749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2350" }, { "cve": "CVE-2017-2365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2365" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2365", "url": "https://www.suse.com/security/cve/CVE-2017-2365" }, { "category": "external", "summary": "SUSE Bug 1024749 for CVE-2017-2365", "url": "https://bugzilla.suse.com/1024749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2365" }, { "cve": "CVE-2017-2371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2371" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the \"WebKit\" component, which allows remote attackers to launch popups via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2371", "url": "https://www.suse.com/security/cve/CVE-2017-2371" }, { "category": "external", "summary": "SUSE Bug 1024749 for CVE-2017-2371", "url": "https://bugzilla.suse.com/1024749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2371" }, { "cve": "CVE-2017-2373", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2373" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2373", "url": "https://www.suse.com/security/cve/CVE-2017-2373" }, { "category": "external", "summary": "SUSE Bug 1024749 for CVE-2017-2373", "url": "https://bugzilla.suse.com/1024749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2373" }, { "cve": "CVE-2017-2496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2496" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2496", "url": "https://www.suse.com/security/cve/CVE-2017-2496" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-2496", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2496" }, { "cve": "CVE-2017-2510", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2510" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with pageshow events.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2510", "url": "https://www.suse.com/security/cve/CVE-2017-2510" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-2510", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2510" }, { "cve": "CVE-2017-2538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2538" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2538", "url": "https://www.suse.com/security/cve/CVE-2017-2538" }, { "category": "external", "summary": "SUSE Bug 1045460 for CVE-2017-2538", "url": "https://bugzilla.suse.com/1045460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2538" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-7006", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7006" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to conduct a timing side-channel attack to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses SVG filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7006", "url": "https://www.suse.com/security/cve/CVE-2017-7006" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7006", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7006" }, { "cve": "CVE-2017-7019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7019" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit Page Loading\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7019", "url": "https://www.suse.com/security/cve/CVE-2017-7019" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7019", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7019" }, { "cve": "CVE-2017-7020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7020" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7020", "url": "https://www.suse.com/security/cve/CVE-2017-7020" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7020", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7020" }, { "cve": "CVE-2017-7030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7030" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7030", "url": "https://www.suse.com/security/cve/CVE-2017-7030" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7030", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7030" }, { "cve": "CVE-2017-7039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7039" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7039", "url": "https://www.suse.com/security/cve/CVE-2017-7039" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7039", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7039" }, { "cve": "CVE-2017-7043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7043" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7043", "url": "https://www.suse.com/security/cve/CVE-2017-7043" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7043", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7043" }, { "cve": "CVE-2017-7046", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7046" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7046", "url": "https://www.suse.com/security/cve/CVE-2017-7046" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7046", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7046" }, { "cve": "CVE-2017-7052", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7052" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7052", "url": "https://www.suse.com/security/cve/CVE-2017-7052" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7052", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7052" }, { "cve": "CVE-2017-7056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7056" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7056", "url": "https://www.suse.com/security/cve/CVE-2017-7056" }, { "category": "external", "summary": "SUSE Bug 1050469 for CVE-2017-7056", "url": "https://bugzilla.suse.com/1050469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7056" }, { "cve": "CVE-2017-7081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7081" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7081", "url": "https://www.suse.com/security/cve/CVE-2017-7081" }, { "category": "external", "summary": "SUSE Bug 1066892 for CVE-2017-7081", "url": "https://bugzilla.suse.com/1066892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-7081" }, { "cve": "CVE-2017-7089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7089" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the \"WebKit\" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7089", "url": "https://www.suse.com/security/cve/CVE-2017-7089" }, { "category": "external", "summary": "SUSE Bug 1066892 for CVE-2017-7089", "url": "https://bugzilla.suse.com/1066892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-7089" }, { "cve": "CVE-2017-7093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7093" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7093", "url": "https://www.suse.com/security/cve/CVE-2017-7093" }, { "category": "external", "summary": "SUSE Bug 1066892 for CVE-2017-7093", "url": "https://bugzilla.suse.com/1066892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-7093" }, { "cve": "CVE-2017-7098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7098" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7098", "url": "https://www.suse.com/security/cve/CVE-2017-7098" }, { "category": "external", "summary": "SUSE Bug 1066892 for CVE-2017-7098", "url": "https://bugzilla.suse.com/1066892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-7098" }, { "cve": "CVE-2017-7104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7104" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7104", "url": "https://www.suse.com/security/cve/CVE-2017-7104" }, { "category": "external", "summary": "SUSE Bug 1066892 for CVE-2017-7104", "url": "https://bugzilla.suse.com/1066892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-7104" }, { "cve": "CVE-2017-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7117" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7117", "url": "https://www.suse.com/security/cve/CVE-2017-7117" }, { "category": "external", "summary": "SUSE Bug 1066892 for CVE-2017-7117", "url": "https://bugzilla.suse.com/1066892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-7117" }, { "cve": "CVE-2017-7156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7156" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7156", "url": "https://www.suse.com/security/cve/CVE-2017-7156" }, { "category": "external", "summary": "SUSE Bug 1073654 for CVE-2017-7156", "url": "https://bugzilla.suse.com/1073654" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7156" }, { "cve": "CVE-2017-7157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7157" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7157", "url": "https://www.suse.com/security/cve/CVE-2017-7157" }, { "category": "external", "summary": "SUSE Bug 1073654 for CVE-2017-7157", "url": "https://bugzilla.suse.com/1073654" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7157" }, { "cve": "CVE-2017-7161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7161" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. Safari before 11.0.2 is affected. The issue involves the \"WebKit Web Inspector\" component. It allows remote attackers to execute arbitrary code via special characters that trigger command injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7161", "url": "https://www.suse.com/security/cve/CVE-2017-7161" }, { "category": "external", "summary": "SUSE Bug 1075775 for CVE-2017-7161", "url": "https://bugzilla.suse.com/1075775" }, { "category": "external", "summary": "SUSE Bug 1077535 for CVE-2017-7161", "url": "https://bugzilla.suse.com/1077535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7161" }, { "cve": "CVE-2018-11646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11646" } ], "notes": [ { "category": "general", "text": "webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11646", "url": "https://www.suse.com/security/cve/CVE-2018-11646" }, { "category": "external", "summary": "SUSE Bug 1095611 for CVE-2018-11646", "url": "https://bugzilla.suse.com/1095611" }, { "category": "external", "summary": "SUSE Bug 1097693 for CVE-2018-11646", "url": "https://bugzilla.suse.com/1097693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-11646" }, { "cve": "CVE-2018-12911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12911" } ], "notes": [ { "category": "general", "text": "WebKitGTK+ 2.20.3 has an off-by-one error, with a resultant out-of-bounds write, in the get_simple_globs functions in ThirdParty/xdgmime/src/xdgmimecache.c and ThirdParty/xdgmime/src/xdgmimeglob.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12911", "url": "https://www.suse.com/security/cve/CVE-2018-12911" }, { "category": "external", "summary": "SUSE Bug 1101999 for CVE-2018-12911", "url": "https://bugzilla.suse.com/1101999" }, { "category": "external", "summary": "SUSE Bug 1104169 for CVE-2018-12911", "url": "https://bugzilla.suse.com/1104169" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12911" }, { "cve": "CVE-2018-4088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4088" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4088", "url": "https://www.suse.com/security/cve/CVE-2018-4088" }, { "category": "external", "summary": "SUSE Bug 1075775 for CVE-2018-4088", "url": "https://bugzilla.suse.com/1075775" }, { "category": "external", "summary": "SUSE Bug 1077535 for CVE-2018-4088", "url": "https://bugzilla.suse.com/1077535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4088" }, { "cve": "CVE-2018-4101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4101" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4101", "url": "https://www.suse.com/security/cve/CVE-2018-4101" }, { "category": "external", "summary": "SUSE Bug 1088182 for CVE-2018-4101", "url": "https://bugzilla.suse.com/1088182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4101" }, { "cve": "CVE-2018-4117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4117" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4117", "url": "https://www.suse.com/security/cve/CVE-2018-4117" }, { "category": "external", "summary": "SUSE Bug 1088182 for CVE-2018-4117", "url": "https://bugzilla.suse.com/1088182" }, { "category": "external", "summary": "SUSE Bug 1102530 for CVE-2018-4117", "url": "https://bugzilla.suse.com/1102530" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4117" }, { "cve": "CVE-2018-4120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4120" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4120", "url": "https://www.suse.com/security/cve/CVE-2018-4120" }, { "category": "external", "summary": "SUSE Bug 1088182 for CVE-2018-4120", "url": "https://bugzilla.suse.com/1088182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4120" }, { "cve": "CVE-2018-4127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4127" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4127", "url": "https://www.suse.com/security/cve/CVE-2018-4127" }, { "category": "external", "summary": "SUSE Bug 1088182 for CVE-2018-4127", "url": "https://bugzilla.suse.com/1088182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4127" }, { "cve": "CVE-2018-4133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4133" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"WebKit\" component. A Safari cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via a crafted URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4133", "url": "https://www.suse.com/security/cve/CVE-2018-4133" }, { "category": "external", "summary": "SUSE Bug 1088182 for CVE-2018-4133", "url": "https://bugzilla.suse.com/1088182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4133" }, { "cve": "CVE-2018-4162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4162" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4162", "url": "https://www.suse.com/security/cve/CVE-2018-4162" }, { "category": "external", "summary": "SUSE Bug 1088182 for CVE-2018-4162", "url": "https://bugzilla.suse.com/1088182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4162" }, { "cve": "CVE-2018-4190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4190" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4190", "url": "https://www.suse.com/security/cve/CVE-2018-4190" }, { "category": "external", "summary": "SUSE Bug 1097693 for CVE-2018-4190", "url": "https://bugzilla.suse.com/1097693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4190" }, { "cve": "CVE-2018-4191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4191" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4191", "url": "https://www.suse.com/security/cve/CVE-2018-4191" }, { "category": "external", "summary": "SUSE Bug 1110279 for CVE-2018-4191", "url": "https://bugzilla.suse.com/1110279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4191" }, { "cve": "CVE-2018-4200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4200" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4200", "url": "https://www.suse.com/security/cve/CVE-2018-4200" }, { "category": "external", "summary": "SUSE Bug 1092280 for CVE-2018-4200", "url": "https://bugzilla.suse.com/1092280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4200" }, { "cve": "CVE-2018-4204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4204" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4204", "url": "https://www.suse.com/security/cve/CVE-2018-4204" }, { "category": "external", "summary": "SUSE Bug 1092279 for CVE-2018-4204", "url": "https://bugzilla.suse.com/1092279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4204" }, { "cve": "CVE-2018-4207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4207" } ], "notes": [ { "category": "general", "text": "In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4207", "url": "https://www.suse.com/security/cve/CVE-2018-4207" }, { "category": "external", "summary": "SUSE Bug 1110279 for CVE-2018-4207", "url": "https://bugzilla.suse.com/1110279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4207" }, { "cve": "CVE-2018-4212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4212" } ], "notes": [ { "category": "general", "text": "In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4212", "url": "https://www.suse.com/security/cve/CVE-2018-4212" }, { "category": "external", "summary": "SUSE Bug 1110279 for CVE-2018-4212", "url": "https://bugzilla.suse.com/1110279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4212" }, { "cve": "CVE-2018-4222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4222" } ], "notes": [ { "category": "general", "text": "An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4222", "url": "https://www.suse.com/security/cve/CVE-2018-4222" }, { "category": "external", "summary": "SUSE Bug 1097693 for CVE-2018-4222", "url": "https://bugzilla.suse.com/1097693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4222" }, { "cve": "CVE-2018-4261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4261" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4261", "url": "https://www.suse.com/security/cve/CVE-2018-4261" }, { "category": "external", "summary": "SUSE Bug 1104169 for CVE-2018-4261", "url": "https://bugzilla.suse.com/1104169" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4261" }, { "cve": "CVE-2018-4264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4264" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4264", "url": "https://www.suse.com/security/cve/CVE-2018-4264" }, { "category": "external", "summary": "SUSE Bug 1104169 for CVE-2018-4264", "url": "https://bugzilla.suse.com/1104169" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4264" }, { "cve": "CVE-2018-4270", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4270" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4270", "url": "https://www.suse.com/security/cve/CVE-2018-4270" }, { "category": "external", "summary": "SUSE Bug 1104169 for CVE-2018-4270", "url": "https://bugzilla.suse.com/1104169" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4270" }, { "cve": "CVE-2018-4284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4284" } ], "notes": [ { "category": "general", "text": "A type confusion issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4284", "url": "https://www.suse.com/security/cve/CVE-2018-4284" }, { "category": "external", "summary": "SUSE Bug 1104169 for CVE-2018-4284", "url": "https://bugzilla.suse.com/1104169" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4284" }, { "cve": "CVE-2018-4306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4306" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4306", "url": "https://www.suse.com/security/cve/CVE-2018-4306" }, { "category": "external", "summary": "SUSE Bug 1110279 for CVE-2018-4306", "url": "https://bugzilla.suse.com/1110279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4306" }, { "cve": "CVE-2018-4315", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4315" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4315", "url": "https://www.suse.com/security/cve/CVE-2018-4315" }, { "category": "external", "summary": "SUSE Bug 1110279 for CVE-2018-4315", "url": "https://bugzilla.suse.com/1110279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4315" }, { "cve": "CVE-2018-4319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4319" } ], "notes": [ { "category": "general", "text": "A cross-origin issue existed with \"iframe\" elements. This was addressed with improved tracking of security origins. This issue affected versions prior to iOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4319", "url": "https://www.suse.com/security/cve/CVE-2018-4319" }, { "category": "external", "summary": "SUSE Bug 1110279 for CVE-2018-4319", "url": "https://bugzilla.suse.com/1110279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4319" }, { "cve": "CVE-2018-4345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4345" } ], "notes": [ { "category": "general", "text": "A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4345", "url": "https://www.suse.com/security/cve/CVE-2018-4345" }, { "category": "external", "summary": "SUSE Bug 1116998 for CVE-2018-4345", "url": "https://bugzilla.suse.com/1116998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4345" }, { "cve": "CVE-2018-4359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4359" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4359", "url": "https://www.suse.com/security/cve/CVE-2018-4359" }, { "category": "external", "summary": "SUSE Bug 1110279 for CVE-2018-4359", "url": "https://bugzilla.suse.com/1110279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-4359" }, { "cve": "CVE-2018-4372", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4372" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4372", "url": "https://www.suse.com/security/cve/CVE-2018-4372" }, { "category": "external", "summary": "SUSE Bug 1116998 for CVE-2018-4372", "url": "https://bugzilla.suse.com/1116998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4372" }, { "cve": "CVE-2018-4375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4375" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4375", "url": "https://www.suse.com/security/cve/CVE-2018-4375" }, { "category": "external", "summary": "SUSE Bug 1116998 for CVE-2018-4375", "url": "https://bugzilla.suse.com/1116998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4375" }, { "cve": "CVE-2018-4382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4382" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4382", "url": "https://www.suse.com/security/cve/CVE-2018-4382" }, { "category": "external", "summary": "SUSE Bug 1116998 for CVE-2018-4382", "url": "https://bugzilla.suse.com/1116998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-4382" }, { "cve": "CVE-2018-4437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4437" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4437", "url": "https://www.suse.com/security/cve/CVE-2018-4437" }, { "category": "external", "summary": "SUSE Bug 1119553 for CVE-2018-4437", "url": "https://bugzilla.suse.com/1119553" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-4437" }, { "cve": "CVE-2018-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4441" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4441", "url": "https://www.suse.com/security/cve/CVE-2018-4441" }, { "category": "external", "summary": "SUSE Bug 1119555 for CVE-2018-4441", "url": "https://bugzilla.suse.com/1119555" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-4441" }, { "cve": "CVE-2018-4443", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-4443" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-4443", "url": "https://www.suse.com/security/cve/CVE-2018-4443" }, { "category": "external", "summary": "SUSE Bug 1119557 for CVE-2018-4443", "url": "https://bugzilla.suse.com/1119557" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-4443" }, { "cve": "CVE-2019-6212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6212" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6212", "url": "https://www.suse.com/security/cve/CVE-2019-6212" }, { "category": "external", "summary": "SUSE Bug 1124937 for CVE-2019-6212", "url": "https://bugzilla.suse.com/1124937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6212" }, { "cve": "CVE-2019-6216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6216" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6216", "url": "https://www.suse.com/security/cve/CVE-2019-6216" }, { "category": "external", "summary": "SUSE Bug 1124937 for CVE-2019-6216", "url": "https://bugzilla.suse.com/1124937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6216" }, { "cve": "CVE-2019-6229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6229" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6229", "url": "https://www.suse.com/security/cve/CVE-2019-6229" }, { "category": "external", "summary": "SUSE Bug 1124937 for CVE-2019-6229", "url": "https://bugzilla.suse.com/1124937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6229" }, { "cve": "CVE-2019-6251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6251" } ], "notes": [ { "category": "general", "text": "WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6251", "url": "https://www.suse.com/security/cve/CVE-2019-6251" }, { "category": "external", "summary": "SUSE Bug 1121894 for CVE-2019-6251", "url": "https://bugzilla.suse.com/1121894" }, { "category": "external", "summary": "SUSE Bug 1132256 for CVE-2019-6251", "url": "https://bugzilla.suse.com/1132256" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6251" }, { "cve": "CVE-2019-7285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7285" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7285", "url": "https://www.suse.com/security/cve/CVE-2019-7285" }, { "category": "external", "summary": "SUSE Bug 1132256 for CVE-2019-7285", "url": "https://bugzilla.suse.com/1132256" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-7285" }, { "cve": "CVE-2019-8375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8375" } ], "notes": [ { "category": "general", "text": "The UIProcess subsystem in WebKit, as used in WebKitGTK through 2.23.90 and WebKitGTK+ through 2.22.6 and other products, does not prevent the script dialog size from exceeding the web view size, which allows remote attackers to cause a denial of service (Buffer Overflow) or possibly have unspecified other impact, related to UIProcess/API/gtk/WebKitScriptDialogGtk.cpp, UIProcess/API/gtk/WebKitScriptDialogImpl.cpp, and UIProcess/API/gtk/WebKitWebViewGtk.cpp, as demonstrated by GNOME Web (aka Epiphany).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8375", "url": "https://www.suse.com/security/cve/CVE-2019-8375" }, { "category": "external", "summary": "SUSE Bug 1126768 for CVE-2019-8375", "url": "https://bugzilla.suse.com/1126768" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8375" }, { "cve": "CVE-2019-8518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8518" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8518", "url": "https://www.suse.com/security/cve/CVE-2019-8518" }, { "category": "external", "summary": "SUSE Bug 1132256 for CVE-2019-8518", "url": "https://bugzilla.suse.com/1132256" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8518" }, { "cve": "CVE-2019-8524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8524" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8524", "url": "https://www.suse.com/security/cve/CVE-2019-8524" }, { "category": "external", "summary": "SUSE Bug 1132256 for CVE-2019-8524", "url": "https://bugzilla.suse.com/1132256" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8524" }, { "cve": "CVE-2019-8551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8551" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8551", "url": "https://www.suse.com/security/cve/CVE-2019-8551" }, { "category": "external", "summary": "SUSE Bug 1132256 for CVE-2019-8551", "url": "https://bugzilla.suse.com/1132256" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8551" }, { "cve": "CVE-2019-8595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8595" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8595", "url": "https://www.suse.com/security/cve/CVE-2019-8595" }, { "category": "external", "summary": "SUSE Bug 1135715 for CVE-2019-8595", "url": "https://bugzilla.suse.com/1135715" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-8595" }, { "cve": "CVE-2019-8625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8625" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8625", "url": "https://www.suse.com/security/cve/CVE-2019-8625" }, { "category": "external", "summary": "SUSE Bug 1155321 for CVE-2019-8625", "url": "https://bugzilla.suse.com/1155321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8625" }, { "cve": "CVE-2019-8644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8644" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8644", "url": "https://www.suse.com/security/cve/CVE-2019-8644" }, { "category": "external", "summary": "SUSE Bug 1148931 for CVE-2019-8644", "url": "https://bugzilla.suse.com/1148931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8644" }, { "cve": "CVE-2019-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8666" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8666", "url": "https://www.suse.com/security/cve/CVE-2019-8666" }, { "category": "external", "summary": "SUSE Bug 1148931 for CVE-2019-8666", "url": "https://bugzilla.suse.com/1148931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8666" }, { "cve": "CVE-2019-8669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8669" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8669", "url": "https://www.suse.com/security/cve/CVE-2019-8669" }, { "category": "external", "summary": "SUSE Bug 1148931 for CVE-2019-8669", "url": "https://bugzilla.suse.com/1148931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8669" }, { "cve": "CVE-2019-8671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8671" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8671", "url": "https://www.suse.com/security/cve/CVE-2019-8671" }, { "category": "external", "summary": "SUSE Bug 1148931 for CVE-2019-8671", "url": "https://bugzilla.suse.com/1148931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8671" }, { "cve": "CVE-2019-8681", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8681" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8681", "url": "https://www.suse.com/security/cve/CVE-2019-8681" }, { "category": "external", "summary": "SUSE Bug 1148931 for CVE-2019-8681", "url": "https://bugzilla.suse.com/1148931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8681" }, { "cve": "CVE-2019-8684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8684" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8684", "url": "https://www.suse.com/security/cve/CVE-2019-8684" }, { "category": "external", "summary": "SUSE Bug 1148931 for CVE-2019-8684", "url": "https://bugzilla.suse.com/1148931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8684" }, { "cve": "CVE-2019-8686", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8686" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8686", "url": "https://www.suse.com/security/cve/CVE-2019-8686" }, { "category": "external", "summary": "SUSE Bug 1148931 for CVE-2019-8686", "url": "https://bugzilla.suse.com/1148931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8686" }, { "cve": "CVE-2019-8719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8719" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8719", "url": "https://www.suse.com/security/cve/CVE-2019-8719" }, { "category": "external", "summary": "SUSE Bug 1155321 for CVE-2019-8719", "url": "https://bugzilla.suse.com/1155321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8719" }, { "cve": "CVE-2019-8726", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8726" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8726", "url": "https://www.suse.com/security/cve/CVE-2019-8726" }, { "category": "external", "summary": "SUSE Bug 1155321 for CVE-2019-8726", "url": "https://bugzilla.suse.com/1155321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8726" }, { "cve": "CVE-2019-8766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8766" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8766", "url": "https://www.suse.com/security/cve/CVE-2019-8766" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8766", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8766" }, { "cve": "CVE-2019-8768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8768" } ], "notes": [ { "category": "general", "text": "\"Clear History and Website Data\" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Catalina 10.15. A user may be unable to delete browsing history items.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8768", "url": "https://www.suse.com/security/cve/CVE-2019-8768" }, { "category": "external", "summary": "SUSE Bug 1155321 for CVE-2019-8768", "url": "https://bugzilla.suse.com/1155321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8768" }, { "cve": "CVE-2019-8771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8771" } ], "notes": [ { "category": "general", "text": "This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8771", "url": "https://www.suse.com/security/cve/CVE-2019-8771" }, { "category": "external", "summary": "SUSE Bug 1155321 for CVE-2019-8771", "url": "https://bugzilla.suse.com/1155321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8771" }, { "cve": "CVE-2019-8783", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8783" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8783", "url": "https://www.suse.com/security/cve/CVE-2019-8783" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8783", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8783" }, { "cve": "CVE-2019-8812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8812" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8812", "url": "https://www.suse.com/security/cve/CVE-2019-8812" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8812", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8812" }, { "cve": "CVE-2019-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8816" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8816", "url": "https://www.suse.com/security/cve/CVE-2019-8816" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8816", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8816" }, { "cve": "CVE-2019-8821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8821" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8821", "url": "https://www.suse.com/security/cve/CVE-2019-8821" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8821", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8821" }, { "cve": "CVE-2019-8835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8835" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8835", "url": "https://www.suse.com/security/cve/CVE-2019-8835" }, { "category": "external", "summary": "SUSE Bug 1161719 for CVE-2019-8835", "url": "https://bugzilla.suse.com/1161719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8835" }, { "cve": "CVE-2020-10018", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10018" } ], "notes": [ { "category": "general", "text": "WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue has been fixed in 2.28.0 with improved memory handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10018", "url": "https://www.suse.com/security/cve/CVE-2020-10018" }, { "category": "external", "summary": "SUSE Bug 1165528 for CVE-2020-10018", "url": "https://bugzilla.suse.com/1165528" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10018" }, { "cve": "CVE-2020-11793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11793" } ], "notes": [ { "category": "general", "text": "A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11793", "url": "https://www.suse.com/security/cve/CVE-2020-11793" }, { "category": "external", "summary": "SUSE Bug 1169658 for CVE-2020-11793", "url": "https://bugzilla.suse.com/1169658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-11793" }, { "cve": "CVE-2020-13558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13558" } ], "notes": [ { "category": "general", "text": "A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13558", "url": "https://www.suse.com/security/cve/CVE-2020-13558" }, { "category": "external", "summary": "SUSE Bug 1182286 for CVE-2020-13558", "url": "https://bugzilla.suse.com/1182286" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-13558" }, { "cve": "CVE-2020-13584", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13584" } ], "notes": [ { "category": "general", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13584", "url": "https://www.suse.com/security/cve/CVE-2020-13584" }, { "category": "external", "summary": "SUSE Bug 1179122 for CVE-2020-13584", "url": "https://bugzilla.suse.com/1179122" }, { "category": "external", "summary": "SUSE Bug 1179910 for CVE-2020-13584", "url": "https://bugzilla.suse.com/1179910" }, { "category": "external", "summary": "SUSE Bug 1179911 for CVE-2020-13584", "url": "https://bugzilla.suse.com/1179911" }, { "category": "external", "summary": "SUSE Bug 1179912 for CVE-2020-13584", "url": "https://bugzilla.suse.com/1179912" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-13584" }, { "cve": "CVE-2020-13753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13753" } ], "notes": [ { "category": "general", "text": "The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u0027s input buffer, similar to CVE-2017-5226.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13753", "url": "https://www.suse.com/security/cve/CVE-2020-13753" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-13753", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-13753" }, { "cve": "CVE-2020-27918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27918" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27918", "url": "https://www.suse.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2020-27918", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27918" }, { "cve": "CVE-2020-3862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-3862" } ], "notes": [ { "category": "general", "text": "A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-3862", "url": "https://www.suse.com/security/cve/CVE-2020-3862" }, { "category": "external", "summary": "SUSE Bug 1163809 for CVE-2020-3862", "url": "https://bugzilla.suse.com/1163809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-3862" }, { "cve": "CVE-2020-3867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-3867" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-3867", "url": "https://www.suse.com/security/cve/CVE-2020-3867" }, { "category": "external", "summary": "SUSE Bug 1163809 for CVE-2020-3867", "url": "https://bugzilla.suse.com/1163809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-3867" }, { "cve": "CVE-2020-3895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-3895" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-3895", "url": "https://www.suse.com/security/cve/CVE-2020-3895" }, { "category": "external", "summary": "SUSE Bug 1170643 for CVE-2020-3895", "url": "https://bugzilla.suse.com/1170643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-3895" }, { "cve": "CVE-2020-3899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-3899" } ], "notes": [ { "category": "general", "text": "A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-3899", "url": "https://www.suse.com/security/cve/CVE-2020-3899" }, { "category": "external", "summary": "SUSE Bug 1170643 for CVE-2020-3899", "url": "https://bugzilla.suse.com/1170643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-3899" }, { "cve": "CVE-2020-3902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-3902" } ], "notes": [ { "category": "general", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-3902", "url": "https://www.suse.com/security/cve/CVE-2020-3902" }, { "category": "external", "summary": "SUSE Bug 1170643 for CVE-2020-3902", "url": "https://bugzilla.suse.com/1170643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-3902" }, { "cve": "CVE-2020-9802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9802" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9802", "url": "https://www.suse.com/security/cve/CVE-2020-9802" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-9802", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-9802" }, { "cve": "CVE-2020-9806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9806" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9806", "url": "https://www.suse.com/security/cve/CVE-2020-9806" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-9806", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-9806" }, { "cve": "CVE-2020-9862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9862" } ], "notes": [ { "category": "general", "text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9862", "url": "https://www.suse.com/security/cve/CVE-2020-9862" }, { "category": "external", "summary": "SUSE Bug 1174662 for CVE-2020-9862", "url": "https://bugzilla.suse.com/1174662" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-9862" }, { "cve": "CVE-2020-9895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9895" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9895", "url": "https://www.suse.com/security/cve/CVE-2020-9895" }, { "category": "external", "summary": "SUSE Bug 1174662 for CVE-2020-9895", "url": "https://bugzilla.suse.com/1174662" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-9895" }, { "cve": "CVE-2020-9947", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9947" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9947", "url": "https://www.suse.com/security/cve/CVE-2020-9947" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2020-9947", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-9947" }, { "cve": "CVE-2021-1788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1788" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1788", "url": "https://www.suse.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "SUSE Bug 1184155 for CVE-2021-1788", "url": "https://bugzilla.suse.com/1184155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2021-1788" }, { "cve": "CVE-2021-1789", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1789" } ], "notes": [ { "category": "general", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1789", "url": "https://www.suse.com/security/cve/CVE-2021-1789" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2021-1789", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2021-1789" }, { "cve": "CVE-2021-1817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1817" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1817", "url": "https://www.suse.com/security/cve/CVE-2021-1817" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1817", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-1817" }, { "cve": "CVE-2021-21775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-21775" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-21775", "url": "https://www.suse.com/security/cve/CVE-2021-21775" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-21775", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-21775" }, { "cve": "CVE-2021-21806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-21806" } ], "notes": [ { "category": "general", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-21806", "url": "https://www.suse.com/security/cve/CVE-2021-21806" }, { "category": "external", "summary": "SUSE Bug 1188294 for CVE-2021-21806", "url": "https://bugzilla.suse.com/1188294" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-21806", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-21806" }, { "cve": "CVE-2021-30661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30661" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30661", "url": "https://www.suse.com/security/cve/CVE-2021-30661" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30661", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30661" }, { "cve": "CVE-2021-30665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30665" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30665", "url": "https://www.suse.com/security/cve/CVE-2021-30665" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30665", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30665" }, { "cve": "CVE-2021-30666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30666" } ], "notes": [ { "category": "general", "text": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30666", "url": "https://www.suse.com/security/cve/CVE-2021-30666" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30666", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30666" }, { "cve": "CVE-2021-30682", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30682" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30682", "url": "https://www.suse.com/security/cve/CVE-2021-30682" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30682", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30682" }, { "cve": "CVE-2021-30744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30744" } ], "notes": [ { "category": "general", "text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30744", "url": "https://www.suse.com/security/cve/CVE-2021-30744" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30744", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30744" }, { "cve": "CVE-2021-30758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30758" } ], "notes": [ { "category": "general", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30758", "url": "https://www.suse.com/security/cve/CVE-2021-30758" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30758", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30758" }, { "cve": "CVE-2021-30799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30799" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30799", "url": "https://www.suse.com/security/cve/CVE-2021-30799" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30799", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30799" }, { "cve": "CVE-2021-30858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30858" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30858", "url": "https://www.suse.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "SUSE Bug 1190701 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1190701" }, { "category": "external", "summary": "SUSE Bug 1191298 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191298" }, { "category": "external", "summary": "SUSE Bug 1191301 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.s390x", "openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1.x86_64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.aarch64", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.ppc64le", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.s390x", "openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30858" } ] }
opensuse-su-2021:1369-1
Vulnerability from csaf_opensuse
Published
2021-10-18 12:13
Modified
2021-10-18 12:13
Summary
Security update for webkit2gtk3
Notes
Title of the patch
Security update for webkit2gtk3
Description of the patch
This update for webkit2gtk3 fixes the following issues:
- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-1369
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\n- Update to version 2.32.4\n- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)\n- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-1369", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1369-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:1369-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:1369-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/" }, { "category": "self", "summary": "SUSE Bug 1188697", "url": "https://bugzilla.suse.com/1188697" }, { "category": "self", "summary": "SUSE Bug 1190701", "url": "https://bugzilla.suse.com/1190701" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21806 page", "url": "https://www.suse.com/security/cve/CVE-2021-21806/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30858 page", "url": "https://www.suse.com/security/cve/CVE-2021-30858/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2021-10-18T12:13:24Z", "generator": { "date": "2021-10-18T12:13:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:1369-1", "initial_release_date": "2021-10-18T12:13:24Z", "revision_history": [ { "date": "2021-10-18T12:13:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "product_id": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "product": { "name": "webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "product_id": "webkit-jsc-4-2.32.4-lp152.2.19.1.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "product": { "name": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "product_id": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "product_id": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "product": { "name": "libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "product_id": "libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "product_id": "webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "product_id": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64", "product_id": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.i586" }, "product_reference": "webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586" }, "product_reference": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64" }, "product_reference": "webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-21806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-21806" } ], "notes": [ { "category": "general", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-21806", "url": "https://www.suse.com/security/cve/CVE-2021-21806" }, { "category": "external", "summary": "SUSE Bug 1188294 for CVE-2021-21806", "url": "https://bugzilla.suse.com/1188294" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-21806", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-18T12:13:24Z", "details": "important" } ], "title": "CVE-2021-21806" }, { "cve": "CVE-2021-30858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30858" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30858", "url": "https://www.suse.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "SUSE Bug 1190701 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1190701" }, { "category": "external", "summary": "SUSE Bug 1191298 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191298" }, { "category": "external", "summary": "SUSE Bug 1191301 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1.noarch", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1.x86_64", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.i586", "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-18T12:13:24Z", "details": "important" } ], "title": "CVE-2021-30858" } ] }
rhsa-2025:10364
Vulnerability from csaf_redhat
Published
2025-07-07 02:28
Modified
2025-07-07 09:40
Summary
Red Hat Security Advisory: webkitgtk4 security update
Notes
Topic
An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.
Security Fix(es):
* webkitgtk: Command injection in web inspector (CVE-2020-9862)
* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)
* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)
* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)
* webkitgtk: Access issue in content security policy (CVE-2020-9915)
* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)
* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)
* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)
* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)
* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)
* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)
* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)
* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)
* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)
* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)
* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)
* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)
* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)
* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)
* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)
* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)
* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)
* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)
* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)
* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)
* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)
* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)
* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)
* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)
* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)
* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)
* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)
* webkitgtk: arbitrary code execution (CVE-2023-37450)
* webkitgtk: arbitrary code execution (CVE-2023-32393)
* webkitgtk: disclose sensitive information (CVE-2023-38133)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)
* webkitgtk: arbitrary code execution (CVE-2023-38594)
* webkitgtk: arbitrary code execution (CVE-2023-38595)
* webkitgtk: track sensitive user information (CVE-2023-38599)
* webkitgtk: arbitrary code execution (CVE-2023-38600)
* webkitgtk: arbitrary code execution (CVE-2023-38611)
* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)
* webkitgtk: arbitrary code execution (CVE-2023-38597)
* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)
* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)
* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)
* webkitgtk: use after free vulnerability (CVE-2023-28198)
* webkitgtk: content security policy blacklist failure (CVE-2023-32370)
* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)
* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)
* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)
* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)
* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)
* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)
* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)
* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)
* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)
* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)
* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)
* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)
* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)
* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)
* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)
* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)
* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)
* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)
* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)
* chromium-browser: Use after free in ANGLE (CVE-2024-4558)
* webkit: pointer authentication bypass (CVE-2024-27834)
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)
* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)
* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)
* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)
* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)
* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)
* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)
* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)
* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)
* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)
* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.\n\nSecurity Fix(es):\n\n* webkitgtk: Command injection in web inspector (CVE-2020-9862)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)\n\n* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)\n\n* webkitgtk: Access issue in content security policy (CVE-2020-9915)\n\n* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)\n\n* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)\n\n* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)\n\n* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)\n\n* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)\n\n* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)\n\n* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\n* webkitgtk: arbitrary code execution (CVE-2023-37450)\n\n* webkitgtk: arbitrary code execution (CVE-2023-32393)\n\n* webkitgtk: disclose sensitive information (CVE-2023-38133)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38594)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38595)\n\n* webkitgtk: track sensitive user information (CVE-2023-38599)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38600)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38611)\n\n* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38597)\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)\n\n* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)\n\n* webkitgtk: use after free vulnerability (CVE-2023-28198)\n\n* webkitgtk: content security policy blacklist failure (CVE-2023-32370)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)\n\n* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)\n\n* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)\n\n* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)\n\n* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)\n\n* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)\n\n* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)\n\n* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)\n\n* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)\n\n* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)\n\n* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)\n\n* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkit: pointer authentication bypass (CVE-2024-27834)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\n* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)\n\n* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)\n\n* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)\n\n* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)\n\n* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)\n\n* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:10364", "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10364.json" } ], "title": "Red Hat Security Advisory: webkitgtk4 security update", "tracking": { "current_release_date": "2025-07-07T09:40:02+00:00", "generator": { "date": "2025-07-07T09:40:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2025:10364", "initial_release_date": "2025-07-07T02:28:52+00:00", "revision_history": [ { "date": "2025-07-07T02:28:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-07T02:28:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-07T09:40:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_id": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-doc@2.48.3-2.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-1745", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270151" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the SVG implementation within WebKitGTK. This flaw allows remote attackers to exploit the removal of an SVGFontFaceElement object, which occurs through specific vectors that trigger the deletion of the object during rendering.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1745" }, { "category": "external", "summary": "RHBZ#2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents" }, { "cve": "CVE-2020-9802", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879545" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9802" }, { "category": "external", "summary": "RHBZ#1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9802", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9803", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879557" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing maliciously crafted web content leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9803" }, { "category": "external", "summary": "RHBZ#1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9803", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9805", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879559" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9805" }, { "category": "external", "summary": "RHBZ#1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9805", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9806", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879563" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkit gtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing of maliciously crafted web content that could lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9806" }, { "category": "external", "summary": "RHBZ#1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9806", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9807", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879564" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9807" }, { "category": "external", "summary": "RHBZ#1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9807", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9843", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879566" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9843" }, { "category": "external", "summary": "RHBZ#1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9843", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue may lead to cross site scripting" }, { "cve": "CVE-2020-9850", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879568" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows a remote attacker to cause arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t shipped any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9850" }, { "category": "external", "summary": "RHBZ#1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9850", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9862", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879532" } ], "notes": [ { "category": "description", "text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Command injection in web inspector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9862" }, { "category": "external", "summary": "RHBZ#1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9862", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9862" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Command injection in web inspector" }, { "cve": "CVE-2020-9893", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879535" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9893" }, { "category": "external", "summary": "RHBZ#1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9894", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879536" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9894" }, { "category": "external", "summary": "RHBZ#1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9894", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9894" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution" }, { "cve": "CVE-2020-9895", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.4 and in WPE WebKit in versions prior to 2.28.4. A use-after-free issue was found allowing a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9895" }, { "category": "external", "summary": "RHBZ#1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9915", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879540" } ], "notes": [ { "category": "description", "text": "An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access issue in content security policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9915" }, { "category": "external", "summary": "RHBZ#1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9915", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9915" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access issue in content security policy" }, { "cve": "CVE-2020-9925", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879541" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9925" }, { "category": "external", "summary": "RHBZ#1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9925", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9947", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944331" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9947" }, { "category": "external", "summary": "RHBZ#1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9947", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9947" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9948", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901214" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9948" }, { "category": "external", "summary": "RHBZ#1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9948", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9948" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2020-9951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901216" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9951" }, { "category": "external", "summary": "RHBZ#1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9951", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-9952", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901219" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: input validation issue may lead to a cross site scripting", "title": "Vulnerability summary" }, { "category": "other", "text": "webkit2gtk3 as shipped with Red Hat Enterprise Linux 8 is not affected by this flaw, as the version shipped is newer than the affected version range.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9952" }, { "category": "external", "summary": "RHBZ#1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9952", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: input validation issue may lead to a cross site scripting" }, { "cve": "CVE-2020-9983", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901221" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write may lead to code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9983" }, { "category": "external", "summary": "RHBZ#1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9983", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write may lead to code execution" }, { "cve": "CVE-2020-13543", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903568" } ], "notes": [ { "category": "description", "text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13543" }, { "category": "external", "summary": "RHBZ#1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0009.html", "url": "https://webkitgtk.org/security/WSA-2020-0009.html" } ], "release_date": "2020-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928886" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13558" }, { "category": "external", "summary": "RHBZ#1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0001.html", "url": "https://webkitgtk.org/security/WSA-2021-0001.html" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution" }, { "cve": "CVE-2020-13584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901212" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13584" }, { "category": "external", "summary": "RHBZ#1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13584", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13584" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13753", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879570" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. The bubblewrap sandbox failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u2019s input buffer, similar to CVE-2017-5226. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13753" }, { "category": "external", "summary": "RHBZ#1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13753", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl" }, { "cve": "CVE-2020-27918", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944323" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "RHBZ#1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2020-29623", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944329" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User may be unable to fully delete browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29623" }, { "category": "external", "summary": "RHBZ#1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: User may be unable to fully delete browsing history" }, { "cve": "CVE-2021-1765", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944333" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1765" }, { "category": "external", "summary": "RHBZ#1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1765" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1788", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944859" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "RHBZ#1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-1789", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944337" } ], "notes": [ { "category": "description", "text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1789" }, { "category": "external", "summary": "RHBZ#1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1799", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944340" } ], "notes": [ { "category": "description", "text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1799" }, { "category": "external", "summary": "RHBZ#1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection" }, { "cve": "CVE-2021-1801", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944343" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1801" }, { "category": "external", "summary": "RHBZ#1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1801", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1817", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986852" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1817" }, { "category": "external", "summary": "RHBZ#1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1817", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1817" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-1820", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986856" } ], "notes": [ { "category": "description", "text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory initialization issue possibly leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1820" }, { "category": "external", "summary": "RHBZ#1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1820", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory initialization issue possibly leading to memory disclosure" }, { "cve": "CVE-2021-1825", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986858" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue leading to cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1825" }, { "category": "external", "summary": "RHBZ#1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1825", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue leading to cross site scripting attack" }, { "cve": "CVE-2021-1826", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986860" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1826" }, { "category": "external", "summary": "RHBZ#1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1826", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-1844", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944862" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1844" }, { "category": "external", "summary": "RHBZ#1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1844", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1870", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944350" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1870" }, { "category": "external", "summary": "RHBZ#1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1870", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1870" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1871", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944867" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1871" }, { "category": "external", "summary": "RHBZ#1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1871", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-21775", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986863" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21775" }, { "category": "external", "summary": "RHBZ#1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21775", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21779", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986866" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way Webkit\u2019s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21779" }, { "category": "external", "summary": "RHBZ#1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21779", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1980441" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21806" }, { "category": "external", "summary": "RHBZ#1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21806", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806" }, { "category": "external", "summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214" } ], "release_date": "2021-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution" }, { "cve": "CVE-2021-30661", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986870" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30661" }, { "category": "external", "summary": "RHBZ#1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30661", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30663", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Integer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30663" }, { "category": "external", "summary": "RHBZ#1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30663", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Integer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30665", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986874" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30665" }, { "category": "external", "summary": "RHBZ#1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30665", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30665" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30666", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986877" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package are vulnerable to a buffer overflow caused by improper bounds checking by the WebKit component. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30666" }, { "category": "external", "summary": "RHBZ#1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30666", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30682", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986879" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to leak of sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30682" }, { "category": "external", "summary": "RHBZ#1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30682", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to leak of sensitive user information" }, { "cve": "CVE-2021-30689", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986881" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30689" }, { "category": "external", "summary": "RHBZ#1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30689", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30720", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986883" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30720" }, { "category": "external", "summary": "RHBZ#1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30720", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers" }, { "cve": "CVE-2021-30734", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986886" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30734" }, { "category": "external", "summary": "RHBZ#1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30734", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30744", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986888" } ], "notes": [ { "category": "description", "text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30744" }, { "category": "external", "summary": "RHBZ#1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30744", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30744" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30749", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986890" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30749" }, { "category": "external", "summary": "RHBZ#1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30758", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986892" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30758" }, { "category": "external", "summary": "RHBZ#1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30758", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion leading to arbitrary code execution" }, { "cve": "CVE-2021-30761", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986894" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by memory corruption in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30761" }, { "category": "external", "summary": "RHBZ#1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30761", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986898" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker can execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30762" }, { "category": "external", "summary": "RHBZ#1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30795", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986900" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30795" }, { "category": "external", "summary": "RHBZ#1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30795", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986902" } ], "notes": [ { "category": "description", "text": "This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Insufficient checks leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30797" }, { "category": "external", "summary": "RHBZ#1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30797", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Insufficient checks leading to arbitrary code execution" }, { "cve": "CVE-2021-30799", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986906" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30799" }, { "category": "external", "summary": "RHBZ#1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30809", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034347" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30809" }, { "category": "external", "summary": "RHBZ#2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30818", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034368" } ], "notes": [ { "category": "description", "text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30818" }, { "category": "external", "summary": "RHBZ#2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30823", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034373" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to HSTS bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30823" }, { "category": "external", "summary": "RHBZ#2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to HSTS bypass" }, { "cve": "CVE-2021-30836", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034376" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30836" }, { "category": "external", "summary": "RHBZ#2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: Out-of-bounds read leading to memory disclosure" }, { "cve": "CVE-2021-30846", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017898" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30846" }, { "category": "external", "summary": "RHBZ#2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30846" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30848", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017901" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30848" }, { "category": "external", "summary": "RHBZ#2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30849", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017904" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30849" }, { "category": "external", "summary": "RHBZ#2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30851", "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2018573" } ], "notes": [ { "category": "description", "text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30851" }, { "category": "external", "summary": "RHBZ#2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30884", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034378" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30884" }, { "category": "external", "summary": "RHBZ#2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history" }, { "cve": "CVE-2021-30887", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034381" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to Content Security Policy bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30887" }, { "category": "external", "summary": "RHBZ#2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to Content Security Policy bypass" }, { "cve": "CVE-2021-30888", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034383" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Information leak via Content Security Policy reports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30888" }, { "category": "external", "summary": "RHBZ#2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Information leak via Content Security Policy reports" }, { "cve": "CVE-2021-30889", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034386" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30889" }, { "category": "external", "summary": "RHBZ#2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30890", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034389" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross-site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30890" }, { "category": "external", "summary": "RHBZ#2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross-site scripting" }, { "cve": "CVE-2021-30897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2038907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin data exfiltration via resource timing API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30897" }, { "category": "external", "summary": "RHBZ#2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin data exfiltration via resource timing API" }, { "cve": "CVE-2021-30934", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044521" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30934" }, { "category": "external", "summary": "RHBZ#2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30936", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044528" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30936" }, { "category": "external", "summary": "RHBZ#2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30936" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044534" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30951" }, { "category": "external", "summary": "RHBZ#2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30952", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30952" }, { "category": "external", "summary": "RHBZ#2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30953", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044542" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30953" }, { "category": "external", "summary": "RHBZ#2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30953" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30954", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044551" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30954" }, { "category": "external", "summary": "RHBZ#2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30984", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044553" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30984" }, { "category": "external", "summary": "RHBZ#2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30984" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-42762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016673" } ], "notes": [ { "category": "description", "text": "BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: limited sandbox escape via VFS syscalls", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42762" }, { "category": "external", "summary": "RHBZ#2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762" } ], "release_date": "2021-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: limited sandbox escape via VFS syscalls" }, { "cve": "CVE-2021-45481", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040327" } ], "notes": [ { "category": "description", "text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45481" }, { "category": "external", "summary": "RHBZ#2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create" }, { "cve": "CVE-2021-45482", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040329" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45482" }, { "category": "external", "summary": "RHBZ#2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild" }, { "cve": "CVE-2021-45483", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040331" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::Frame::page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45483" }, { "category": "external", "summary": "RHBZ#2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::Frame::page" }, { "cve": "CVE-2022-0108", "discovery_date": "2022-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2037469" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in Navigation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0108" }, { "category": "external", "summary": "RHBZ#2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108" } ], "release_date": "2022-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in Navigation" }, { "cve": "CVE-2022-22589", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053179" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22589" }, { "category": "external", "summary": "RHBZ#2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22589" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript" }, { "cve": "CVE-2022-22590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053181" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22590" }, { "category": "external", "summary": "RHBZ#2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-22592", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053185" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22592" }, { "category": "external", "summary": "RHBZ#2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2022-22594", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045291" } ], "notes": [ { "category": "description", "text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22594" }, { "category": "external", "summary": "RHBZ#2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2022-22620", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056474" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22620" }, { "category": "external", "summary": "RHBZ#2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0003.html", "url": "https://webkitgtk.org/security/WSA-2022-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-02-11T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free" }, { "cve": "CVE-2022-22624", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073893" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22624" }, { "category": "external", "summary": "RHBZ#2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22628", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073896" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22628" }, { "category": "external", "summary": "RHBZ#2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22629", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073899" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22629" }, { "category": "external", "summary": "RHBZ#2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2022-22637", "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073903" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue was addressed with improved state management", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22637" }, { "category": "external", "summary": "RHBZ#2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue was addressed with improved state management" }, { "cve": "CVE-2022-22662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104787" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22662" }, { "category": "external", "summary": "RHBZ#2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure" }, { "cve": "CVE-2022-22677", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104788" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call or the audio capture is interrupted. This flaw allows a remote attacker to perform a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability does not affect RHEL because WebRTC code is not included in any WebKitGTK releases thus far.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22677" }, { "category": "external", "summary": "RHBZ#2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted" }, { "cve": "CVE-2022-26700", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092732" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26700" }, { "category": "external", "summary": "RHBZ#2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26709", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092733" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26709" }, { "category": "external", "summary": "RHBZ#2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104789" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26710" }, { "category": "external", "summary": "RHBZ#2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26716", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092734" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26716" }, { "category": "external", "summary": "RHBZ#2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26717", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092735" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26717" }, { "category": "external", "summary": "RHBZ#2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26719", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092736" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26719" }, { "category": "external", "summary": "RHBZ#2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-30293", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082548" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30293" }, { "category": "external", "summary": "RHBZ#2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution" }, { "cve": "CVE-2022-30294", "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082544" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw was found to be a duplicate of CVE-2022-30293. Please see https://access.redhat.com/security/cve/CVE-2022-30293 for information about affected products and security errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30294" }, { "category": "external", "summary": "RHBZ#2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30294" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0.0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "title": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer" }, { "cve": "CVE-2022-32792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238973" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32792" }, { "category": "external", "summary": "RHBZ#2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32816", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238975" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: malicious content may lead to UI spoofing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32816" }, { "category": "external", "summary": "RHBZ#2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: malicious content may lead to UI spoofing" }, { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2022-32886", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128643" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: buffer overflow issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32886" }, { "category": "external", "summary": "RHBZ#2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: buffer overflow issue was addressed with improved memory handling" }, { "cve": "CVE-2022-32888", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140501" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32888" }, { "category": "external", "summary": "RHBZ#2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking" }, { "cve": "CVE-2022-32891", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128647" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32891" }, { "category": "external", "summary": "RHBZ#2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32891" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content" }, { "cve": "CVE-2022-32893", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121645" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to an out-of-bounds write. This flaw allows an attacker with network access to pass specially crafted web content files, causing arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Since Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32893" }, { "category": "external", "summary": "RHBZ#2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32893", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0008.html", "url": "https://webkitgtk.org/security/WSA-2022-0008.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-08-18T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32912", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128645" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32912" }, { "category": "external", "summary": "RHBZ#2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32912", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32912" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2022-32919", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271437" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK and WPE WebKit that allows a remote attacker to conduct spoofing attacks by exploiting improper UI handling. This flaw enables attackers to create specially crafted websites that can display misleading information to users. By exploiting this vulnerability, an attacker can trick users into believing they are interacting with a legitimate website, potentially leading to a UI spoofing attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32919" }, { "category": "external", "summary": "RHBZ#2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32919", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32919" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing." }, { "cve": "CVE-2022-32923", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: correctness issue in the JIT was addressed with improved checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32923" }, { "category": "external", "summary": "RHBZ#2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: correctness issue in the JIT was addressed with improved checks" }, { "cve": "CVE-2022-32933", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271441" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a website may be able to track the websites a user visited in private browsing mode.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A website may able to track visited websites in private browsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32933" }, { "category": "external", "summary": "RHBZ#2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32933", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32933" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A website may able to track visited websites in private browsing" }, { "cve": "CVE-2022-42799", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: issue was addressed with improved UI handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42799" }, { "category": "external", "summary": "RHBZ#2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: issue was addressed with improved UI handling" }, { "cve": "CVE-2022-42823", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140505" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42823" }, { "category": "external", "summary": "RHBZ#2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42824", "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140504" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: sensitive information disclosure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42824" }, { "category": "external", "summary": "RHBZ#2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: sensitive information disclosure issue" }, { "cve": "CVE-2022-42826", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167716" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42826" }, { "category": "external", "summary": "RHBZ#2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42852", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156986" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory disclosure issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42852" }, { "category": "external", "summary": "RHBZ#2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory disclosure issue was addressed with improved memory handling" }, { "cve": "CVE-2022-42856", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-12-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153683" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42856" }, { "category": "external", "summary": "RHBZ#2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42856", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useFTLJIT=0 will disable the vulnerable code. (This will also somewhat slow down JavaScript execution.)", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-12-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution" }, { "cve": "CVE-2022-42863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156987" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42863" }, { "category": "external", "summary": "RHBZ#2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42867", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156989" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42867" }, { "category": "external", "summary": "RHBZ#2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46691", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156990" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46691" }, { "category": "external", "summary": "RHBZ#2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46692", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156991" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46692" }, { "category": "external", "summary": "RHBZ#2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46692" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass issue" }, { "cve": "CVE-2022-46698", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156992" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue leading to user information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46698" }, { "category": "external", "summary": "RHBZ#2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue leading to user information disclosure" }, { "cve": "CVE-2022-46699", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156993" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46699" }, { "category": "external", "summary": "RHBZ#2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46699" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46700", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156994" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46700" }, { "category": "external", "summary": "RHBZ#2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271444" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to bypass security restrictions and spoof the user\u0027s address bar. This issue occurs when a victim is persuaded to access a specially crafted website due to improper handling of URLs.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46705" }, { "category": "external", "summary": "RHBZ#2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2022-46725", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271446" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw occurs due to an issue in the component URL Handler, which allows a remote attacker to manipulate an unknown input that can lead to clickjacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46725" }, { "category": "external", "summary": "RHBZ#2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing." }, { "cve": "CVE-2022-48503", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218623" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: improper bounds checking leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-48503" }, { "category": "external", "summary": "RHBZ#2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: improper bounds checking leading to arbitrary code execution" }, { "cve": "CVE-2023-23517", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167717" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23517" }, { "category": "external", "summary": "RHBZ#2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23518", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167715" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23518" }, { "category": "external", "summary": "RHBZ#2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23529", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2169934" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23529" }, { "category": "external", "summary": "RHBZ#2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23529", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0002.html", "url": "https://webkitgtk.org/security/WSA-2023-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useDFGJIT=0 will mitigate this issue.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-02-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution" }, { "cve": "CVE-2023-25358", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2175099" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-25358" }, { "category": "external", "summary": "RHBZ#2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358" }, { "category": "external", "summary": "https://bugs.webkit.org/show_bug.cgi?id=242683", "url": "https://bugs.webkit.org/show_bug.cgi?id=242683" } ], "release_date": "2022-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()" }, { "cve": "CVE-2023-27932", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may bypass the same-origin Policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass via crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27932" }, { "category": "external", "summary": "RHBZ#2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27932", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass via crafted web content" }, { "cve": "CVE-2023-27954", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236844" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue leads to tracking sensitive user information via a website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Website may be able to track sensitive user information", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27954" }, { "category": "external", "summary": "RHBZ#2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Website may be able to track sensitive user information" }, { "cve": "CVE-2023-28198", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238943" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28198" }, { "category": "external", "summary": "RHBZ#2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free vulnerability" }, { "cve": "CVE-2023-28204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209208" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: an out-of-bounds read when processing malicious content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28204" }, { "category": "external", "summary": "RHBZ#2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: an out-of-bounds read when processing malicious content" }, { "cve": "CVE-2023-28205", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185724" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: use-after-free leads to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28205" }, { "category": "external", "summary": "RHBZ#2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-6qjh-p74q-89mv", "url": "https://github.com/advisories/GHSA-6qjh-p74q-89mv" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-04-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: use-after-free leads to arbitrary code execution" }, { "cve": "CVE-2023-32359", "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271449" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a user\u2019s password may be read aloud by a text-to-speech accessibility feature.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32359" }, { "category": "external", "summary": "RHBZ#2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32359" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature" }, { "cve": "CVE-2023-32370", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238944" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. A logic issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: content security policy blacklist failure", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32370" }, { "category": "external", "summary": "RHBZ#2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: content security policy blacklist failure" }, { "cve": "CVE-2023-32373", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209214" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: a use-after-free when processing maliciously crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32373" }, { "category": "external", "summary": "RHBZ#2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32373" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: a use-after-free when processing maliciously crafted web content" }, { "cve": "CVE-2023-32393", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2224608" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32393" }, { "category": "external", "summary": "RHBZ#2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32393" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0006.html", "url": "https://webkitgtk.org/security/WSA-2023-0006.html" } ], "release_date": "2023-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-32435", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218626" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32435" }, { "category": "external", "summary": "RHBZ#2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-32439", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218640" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32439" }, { "category": "external", "summary": "RHBZ#2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2023-35074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241403" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35074" }, { "category": "external", "summary": "RHBZ#2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-37450", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223000" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37450" }, { "category": "external", "summary": "RHBZ#2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-07-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38133", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231015" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to excessive data output in WebKit Process Model. This issue occurs when processing malicious web content, which may lead to sensitive information disclosure to unauthorized attackers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: disclose sensitive information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38133" }, { "category": "external", "summary": "RHBZ#2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38133", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: disclose sensitive information" }, { "cve": "CVE-2023-38572", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231028" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This flaw exists due to an error when handling the Same Origin Policy. A remote attacker can bypass Same Origin Policy restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: bypass Same Origin Policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38572" }, { "category": "external", "summary": "RHBZ#2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: bypass Same Origin Policy" }, { "cve": "CVE-2023-38592", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231017" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38592" }, { "category": "external", "summary": "RHBZ#2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38592", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-38594", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231018" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38594" }, { "category": "external", "summary": "RHBZ#2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38595", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231019" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38595" }, { "category": "external", "summary": "RHBZ#2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38597", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231043" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38597" }, { "category": "external", "summary": "RHBZ#2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38597" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38599", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231020" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to a logic issue in WebKit related to a user\u0027s privacy. A remote attacker may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: track sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38599" }, { "category": "external", "summary": "RHBZ#2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38599" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: track sensitive user information" }, { "cve": "CVE-2023-38600", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231021" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38600" }, { "category": "external", "summary": "RHBZ#2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38600", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38611", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231022" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38611" }, { "category": "external", "summary": "RHBZ#2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38611" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-39928", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241400" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the WebKitGTK\u0027s MediaRecorder API that may lead to memory corruption and Remote Code Execution. The victim needs to access a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39928" }, { "category": "external", "summary": "RHBZ#2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39928", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39928" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-40414", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270143" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit could allow an attacker to execute arbitrary code on a target system. The issue arises from a use-after-free flaw in memory management when processing web content. This flaw can potentially give attackers the ability to take control of affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40414" }, { "category": "external", "summary": "RHBZ#2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40414" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-40451", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241409" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. An attacker may be able to execute JavaScript code to trigger Remote Code Execution, resulting in a high impact on data confidentiality, integrity, and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40451" }, { "category": "external", "summary": "RHBZ#2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code" }, { "cve": "CVE-2023-41074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241412" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41074" }, { "category": "external", "summary": "RHBZ#2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-41983", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271453" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit may result in a denial-of-service when processing web content. This issue arises from improper memory handling, which could be exploited by attackers to crash the affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41983" }, { "category": "external", "summary": "RHBZ#2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41983", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial of service" }, { "cve": "CVE-2023-41993", "discovery_date": "2023-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240522" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41993" }, { "category": "external", "summary": "RHBZ#2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-09-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42833", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270146" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42833" }, { "category": "external", "summary": "RHBZ#2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42833", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42843", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271717" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit that may allow a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. By tricking a victim into visiting a specially crafted website, the attacker could perform address bar spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42843" }, { "category": "external", "summary": "RHBZ#2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254326" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious image, which could result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing a malicious image may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42883" }, { "category": "external", "summary": "RHBZ#2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing a malicious image may lead to a denial of service" }, { "cve": "CVE-2023-42890", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254327" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML content in WebKit, which could result in memory corruption and arbitrary code execution on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While the discovered flaw in WebKitGTK does indeed present a concerning potential for arbitrary code execution due to memory corruption, its severity is assessed as moderate rather than critical for several reasons. Firstly, successful exploitation of the vulnerability requires the user to interact with malicious HTML content, typically through visiting a compromised website. This dependency on user interaction reduces the likelihood of widespread exploitation compared to vulnerabilities that can be remotely exploited without user interaction. Additionally, the impact of the flaw may be mitigated by various security measures such as sandboxing or Content Security Policy (CSP) enforcement, which can limit the execution environment for potentially malicious code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42890" }, { "category": "external", "summary": "RHBZ#2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42890", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42916", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253054" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leads to sensitive data leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42916" }, { "category": "external", "summary": "RHBZ#2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read leads to sensitive data leak" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42950", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271718" } ], "notes": [ { "category": "description", "text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: heap use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42950" }, { "category": "external", "summary": "RHBZ#2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: heap use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2023-42956", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271719" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This issue may allow an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42956" }, { "category": "external", "summary": "RHBZ#2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42956", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to a denial of service" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23213", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK\u00a0. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23213" }, { "category": "external", "summary": "RHBZ#2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23213", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-23252", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270288" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to denial-of-service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23252" }, { "category": "external", "summary": "RHBZ#2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to denial-of-service" }, { "cve": "CVE-2024-23254", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270289" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: malicious website may exfiltrate audio data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23254" }, { "category": "external", "summary": "RHBZ#2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: malicious website may exfiltrate audio data cross-origin" }, { "cve": "CVE-2024-23263", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270290" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23263" }, { "category": "external", "summary": "RHBZ#2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23263" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-23271", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2024-09-25T15:33:21.499000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314696" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23271" }, { "category": "external", "summary": "RHBZ#2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior" }, { "cve": "CVE-2024-23280", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270291" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23280" }, { "category": "external", "summary": "RHBZ#2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-23284", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270292" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23284" }, { "category": "external", "summary": "RHBZ#2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27834", "cwe": { "id": "CWE-288", "name": "Authentication Bypass Using an Alternate Path or Channel" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282412" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: pointer authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27834" }, { "category": "external", "summary": "RHBZ#2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0003.html", "url": "https://webkitgtk.org/security/WSA-2024-0003.html" } ], "release_date": "2024-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: pointer authentication bypass" }, { "cve": "CVE-2024-27838", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-09-25T15:42:35.706000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314702" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27838" }, { "category": "external", "summary": "RHBZ#2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-40866", "discovery_date": "2024-09-17T00:31:06.549134+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312724" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40866" }, { "category": "external", "summary": "RHBZ#2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866" }, { "category": "external", "summary": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238" }, { "category": "external", "summary": "https://support.apple.com/en-us/121241", "url": "https://support.apple.com/en-us/121241" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-17T00:15:49.840000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44187", "discovery_date": "2024-09-25T15:50:57.927000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44187" }, { "category": "external", "summary": "RHBZ#2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-44192", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-03-20T12:50:04.459000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353871" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44192" }, { "category": "external", "summary": "RHBZ#2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44192", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44296", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2024-11-01T21:16:26.289000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323289" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44296" }, { "category": "external", "summary": "RHBZ#2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44296" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2024-44308", "discovery_date": "2024-11-21T23:02:37.337000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327931" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in WebKitGTK\u0027s JIT compiler. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this vulnerability, the WebKitGTK JIT engine must be enabled and an attacker needs to trick a user into processing or loading malicious web content. This feature is disabled in Red Hat Enterprise Linux versions 8 and 9, meaning these releases are not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44308" }, { "category": "external", "summary": "RHBZ#2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nAffected installations of Red Hat Enterprise Linux 7 can disable the JIT engine by setting the JavaScriptCoreUseJIT environment variable to 0.\n\nAdditionally, in Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-44309", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2024-11-21T22:51:08.987000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327927" } ], "notes": [ { "category": "description", "text": "A data isolation bypass vulnerability was discovered in WebKitGTK. Processing maliciously crafted web content could enable a cross-site scripting (XSS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: data isolation bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as IMPORTANT severity due to a cookie management issue that allows an attacker to inject maliciously crafted web content, potentially leading to a cross-site scripting (XSS) attack, this flaw occurs because of improper state management during cookie handling, which could allow unauthorized script execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44309" }, { "category": "external", "summary": "RHBZ#2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44309" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: data isolation bypass vulnerability" }, { "cve": "CVE-2024-54467", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-03-20T12:50:18.647000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353872" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to a cookie management issue related to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54467" }, { "category": "external", "summary": "RHBZ#2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54467", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-54479", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2024-12-23T13:16:54.800976+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333841" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. In affected versions of this package, processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as an Important severity because an attacker can process maliciously crafted web content, potentially leading to an unexpected process crash. This issue can disrupt the system stability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54479" }, { "category": "external", "summary": "RHBZ#2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54479", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:57:33.957000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54502", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-12-23T13:18:24.328627+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54502" }, { "category": "external", "summary": "RHBZ#2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:51.903000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54505", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-12-23T13:18:27.108126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333844" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a type confusion issue due to improper memory handling, causing memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54505" }, { "category": "external", "summary": "RHBZ#2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54505", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:31.052000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54508", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-12-23T13:18:30.107103+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333845" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54508" }, { "category": "external", "summary": "RHBZ#2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:14.487000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-02-10T09:37:24.253576+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344619" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "RHBZ#2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2025-01-27T21:46:30.578000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54551", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:23:49.963000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357909" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54551" }, { "category": "external", "summary": "RHBZ#2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54551", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2024-54658", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-11T16:12:08.426000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344946" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "RHBZ#2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24143", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2025-02-10T09:40:08.138428+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344621" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A maliciously crafted web page may be able to fingerprint the user due to improper access restrictions to the file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a maliciously crafted web page.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "RHBZ#2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24143", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:05.639000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted web pages or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2025-24150", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2025-02-10T09:41:46.644580+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344622" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Copying a URL from Web Inspector may lead to command injection due to improper file handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Copying a URL from Web Inspector may lead to command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into performing unlikely actions, such as enabling and opening the web inspector in an application and loading malicious web content into it. For this reason, this flaw has been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "RHBZ#2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24150", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:32.259000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Copying a URL from Web Inspector may lead to command injection" }, { "cve": "CVE-2025-24158", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-10T09:43:02.859455+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344623" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "RHBZ#2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:49.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24162", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-02-10T09:44:11.167306+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344624" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "RHBZ#2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:54.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24201", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-03-12T22:35:00.430000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351802" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24201" }, { "category": "external", "summary": "RHBZ#2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201" }, { "category": "external", "summary": "https://support.apple.com/en-us/122281", "url": "https://support.apple.com/en-us/122281" }, { "category": "external", "summary": "https://support.apple.com/en-us/122284", "url": "https://support.apple.com/en-us/122284" }, { "category": "external", "summary": "https://support.apple.com/en-us/122285", "url": "https://support.apple.com/en-us/122285" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-03-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: out-of-bounds write vulnerability" }, { "cve": "CVE-2025-24208", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2025-04-07T14:26:09.363000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357910" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Loading a malicious iframe can cause a cross-site scripting attack due to permissions issues.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24208" }, { "category": "external", "summary": "RHBZ#2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack" }, { "cve": "CVE-2025-24209", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2025-04-07T14:27:43.092000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357911" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper memory handling and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24209" }, { "category": "external", "summary": "RHBZ#2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24209", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24213", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-04-07T14:28:47.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357913" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper handling of floats and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A type confusion issue could lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThe x86_64 architecture is not vulnerable to this issue, the x86 architecture is not vulnerable when the SSE2 instruction set is enabled, all other architectures are vulnerable to this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24213" }, { "category": "external", "summary": "RHBZ#2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24213", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: A type confusion issue could lead to memory corruption" }, { "cve": "CVE-2025-24216", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:29:49.645000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357917" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24216" }, { "category": "external", "summary": "RHBZ#2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-30427", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-04-07T14:32:29.265000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357919" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-30427" }, { "category": "external", "summary": "RHBZ#2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-30427", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31205", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-05-15T13:05:47.441000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366501" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may steal data cross-origin due to improper security checks within the web browser or rendering engine, leading to unauthorized disclosure of information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31205" }, { "category": "external", "summary": "RHBZ#2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-31257", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:08:57.791000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366504" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31257" }, { "category": "external", "summary": "RHBZ#2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31257", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" } ] }
rhsa-2021_4381
Vulnerability from csaf_redhat
Published
2021-11-09 18:30
Modified
2024-11-22 16:51
Summary
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
Notes
Topic
An update for GNOME is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GNOME is the default desktop environment of Red Hat Enterprise Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for GNOME is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GNOME is the default desktop environment of Red Hat Enterprise Linux.\n\nThe following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)\n\n* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4381", "url": "https://access.redhat.com/errata/RHSA-2021:4381" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1651378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651378" }, { "category": "external", "summary": "1770302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770302" }, { "category": "external", "summary": "1791478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791478" }, { "category": "external", "summary": "1813727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813727" }, { "category": "external", "summary": "1854679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854679" }, { "category": "external", "summary": "1873297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873297" }, { "category": "external", "summary": "1873488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873488" }, { "category": "external", "summary": "1888404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888404" }, { "category": "external", "summary": "1894613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894613" }, { "category": "external", "summary": "1897932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897932" }, { "category": "external", "summary": "1904139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904139" }, { "category": "external", "summary": "1905000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905000" }, { "category": "external", "summary": "1909300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909300" }, { "category": "external", "summary": "1914925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914925" }, { "category": "external", "summary": "1924725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924725" }, { "category": "external", "summary": "1925640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925640" }, { "category": "external", "summary": "1928794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928794" }, { "category": "external", "summary": "1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "1935261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935261" }, { "category": "external", "summary": "1937416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937416" }, { "category": "external", "summary": "1937866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937866" }, { "category": "external", "summary": "1938937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1938937" }, { "category": "external", "summary": "1940026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940026" }, { "category": "external", "summary": "1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "1949176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949176" }, { "category": "external", "summary": "1951086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951086" }, { "category": "external", "summary": "1952136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952136" }, { "category": "external", "summary": "1955754", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955754" }, { "category": "external", "summary": "1957705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957705" }, { "category": "external", "summary": "1960705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960705" }, { "category": "external", "summary": "1962049", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962049" }, { "category": "external", "summary": "1971507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971507" }, { "category": "external", "summary": "1971534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971534" }, { "category": "external", "summary": "1972545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972545" }, { "category": "external", "summary": "1978287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978287" }, { "category": "external", "summary": "1978505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978505" }, { "category": "external", "summary": "1978612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978612" }, { "category": "external", "summary": "1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "1980661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980661" }, { "category": "external", "summary": "1981420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981420" }, { "category": "external", "summary": "1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "1987233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987233" }, { "category": "external", "summary": "1989035", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989035" }, { "category": "external", "summary": "1998989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998989" }, { "category": "external", "summary": "1999120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999120" }, { "category": "external", "summary": "2004170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004170" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4381.json" } ], "title": "Red Hat Security Advisory: GNOME security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T16:51:52+00:00", "generator": { "date": "2024-11-22T16:51:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4381", "initial_release_date": "2021-11-09T18:30:36+00:00", "revision_history": [ { "date": "2021-11-09T18:30:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:30:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T16:51:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gnome-online-accounts-0:3.28.2-3.el8.src", "product": { "name": "gnome-online-accounts-0:3.28.2-3.el8.src", "product_id": "gnome-online-accounts-0:3.28.2-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts@3.28.2-3.el8?arch=src" } } }, { "category": "product_version", "name": "LibRaw-0:0.19.5-3.el8.src", "product": { "name": "LibRaw-0:0.19.5-3.el8.src", "product_id": "LibRaw-0:0.19.5-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw@0.19.5-3.el8?arch=src" } } }, { "category": "product_version", "name": "gnome-autoar-0:0.2.3-2.el8.src", "product": { "name": "gnome-autoar-0:0.2.3-2.el8.src", "product_id": "gnome-autoar-0:0.2.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar@0.2.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "vino-0:3.22.0-11.el8.src", "product": { "name": "vino-0:3.22.0-11.el8.src", "product_id": "vino-0:3.22.0-11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino@3.22.0-11.el8?arch=src" } } }, { "category": "product_version", "name": "gnome-software-0:3.36.1-10.el8.src", "product": { "name": "gnome-software-0:3.36.1-10.el8.src", "product_id": "gnome-software-0:3.36.1-10.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software@3.36.1-10.el8?arch=src" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.src", "product": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.src", "product_id": "gsettings-desktop-schemas-0:3.32.0-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas@3.32.0-6.el8?arch=src" } } }, { "category": "product_version", "name": "gnome-calculator-0:3.28.2-2.el8.src", "product": { "name": "gnome-calculator-0:3.28.2-2.el8.src", "product_id": "gnome-calculator-0:3.28.2-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator@3.28.2-2.el8?arch=src" } } }, { "category": "product_version", "name": "gtk3-0:3.22.30-8.el8.src", "product": { "name": "gtk3-0:3.22.30-8.el8.src", "product_id": "gtk3-0:3.22.30-8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3@3.22.30-8.el8?arch=src" } } }, { "category": "product_version", "name": "gnome-session-0:3.28.1-13.el8.src", "product": { "name": "gnome-session-0:3.28.1-13.el8.src", "product_id": "gnome-session-0:3.28.1-13.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session@3.28.1-13.el8?arch=src" } } }, { "category": "product_version", "name": "accountsservice-0:0.6.55-2.el8.src", "product": { "name": "accountsservice-0:0.6.55-2.el8.src", "product_id": "accountsservice-0:0.6.55-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice@0.6.55-2.el8?arch=src" } } }, { "category": "product_version", "name": "gnome-shell-extensions-0:3.32.1-20.el8.src", "product": { "name": "gnome-shell-extensions-0:3.32.1-20.el8.src", "product_id": "gnome-shell-extensions-0:3.32.1-20.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extensions@3.32.1-20.el8?arch=src" } } }, { "category": "product_version", "name": "gnome-shell-0:3.32.2-40.el8.src", "product": { "name": "gnome-shell-0:3.32.2-40.el8.src", "product_id": "gnome-shell-0:3.32.2-40.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell@3.32.2-40.el8?arch=src" } } }, { "category": "product_version", "name": "mutter-0:3.32.2-60.el8.src", "product": { "name": "mutter-0:3.32.2-60.el8.src", "product_id": "mutter-0:3.32.2-60.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter@3.32.2-60.el8?arch=src" } } }, { "category": "product_version", "name": "gnome-control-center-0:3.28.2-28.el8.src", "product": { "name": "gnome-control-center-0:3.28.2-28.el8.src", "product_id": "gnome-control-center-0:3.28.2-28.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center@3.28.2-28.el8?arch=src" } } }, { "category": "product_version", "name": "gnome-settings-daemon-0:3.32.0-16.el8.src", "product": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.src", "product_id": "gnome-settings-daemon-0:3.32.0-16.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon@3.32.0-16.el8?arch=src" } } }, { "category": "product_version", "name": "gdm-1:40.0-15.el8.src", "product": { "name": "gdm-1:40.0-15.el8.src", "product_id": "gdm-1:40.0-15.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm@40.0-15.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.32.3-2.el8.src", "product": { "name": "webkit2gtk3-0:2.32.3-2.el8.src", "product_id": "webkit2gtk3-0:2.32.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.32.3-2.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gnome-online-accounts-0:3.28.2-3.el8.aarch64", "product": { "name": "gnome-online-accounts-0:3.28.2-3.el8.aarch64", "product_id": "gnome-online-accounts-0:3.28.2-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts@3.28.2-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "product": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "product_id": "gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-devel@3.28.2-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "product": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "product_id": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debugsource@3.28.2-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "product": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "product_id": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debuginfo@3.28.2-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-autoar-0:0.2.3-2.el8.aarch64", "product": { "name": "gnome-autoar-0:0.2.3-2.el8.aarch64", "product_id": "gnome-autoar-0:0.2.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar@0.2.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "product": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "product_id": "gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debugsource@0.2.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "product": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "product_id": "gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debuginfo@0.2.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "vino-0:3.22.0-11.el8.aarch64", "product": { "name": "vino-0:3.22.0-11.el8.aarch64", "product_id": "vino-0:3.22.0-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino@3.22.0-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "vino-debugsource-0:3.22.0-11.el8.aarch64", "product": { "name": "vino-debugsource-0:3.22.0-11.el8.aarch64", "product_id": "vino-debugsource-0:3.22.0-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino-debugsource@3.22.0-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "vino-debuginfo-0:3.22.0-11.el8.aarch64", "product": { "name": "vino-debuginfo-0:3.22.0-11.el8.aarch64", "product_id": "vino-debuginfo-0:3.22.0-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino-debuginfo@3.22.0-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-software-0:3.36.1-10.el8.aarch64", "product": { "name": "gnome-software-0:3.36.1-10.el8.aarch64", "product_id": "gnome-software-0:3.36.1-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software@3.36.1-10.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "product": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "product_id": "gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debugsource@3.36.1-10.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "product": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "product_id": "gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debuginfo@3.36.1-10.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-software-devel-0:3.36.1-10.el8.aarch64", "product": { "name": "gnome-software-devel-0:3.36.1-10.el8.aarch64", "product_id": "gnome-software-devel-0:3.36.1-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-devel@3.36.1-10.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "product": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "product_id": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas-devel@3.32.0-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "product": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "product_id": "gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas@3.32.0-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-calculator-0:3.28.2-2.el8.aarch64", "product": { "name": "gnome-calculator-0:3.28.2-2.el8.aarch64", "product_id": "gnome-calculator-0:3.28.2-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator@3.28.2-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "product": { "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "product_id": "gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator-debugsource@3.28.2-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "product": { "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "product_id": "gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator-debuginfo@3.28.2-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "product_id": "gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-devel-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-devel-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-devel-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-debugsource-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-debugsource-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-debugsource-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debugsource@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "product_id": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache-debuginfo@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debuginfo@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel-debuginfo@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim-debuginfo@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodules-debuginfo@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "product": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "product_id": "gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-tests-debuginfo@3.22.30-8.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-session-0:3.28.1-13.el8.aarch64", "product": { "name": "gnome-session-0:3.28.1-13.el8.aarch64", "product_id": "gnome-session-0:3.28.1-13.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session@3.28.1-13.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "product": { "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "product_id": "gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-kiosk-session@3.28.1-13.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "product": { "name": "gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "product_id": "gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-wayland-session@3.28.1-13.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-session-xsession-0:3.28.1-13.el8.aarch64", "product": { "name": "gnome-session-xsession-0:3.28.1-13.el8.aarch64", "product_id": "gnome-session-xsession-0:3.28.1-13.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-xsession@3.28.1-13.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "product": { "name": "gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "product_id": "gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-debugsource@3.28.1-13.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "product": { "name": "gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "product_id": "gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-debuginfo@3.28.1-13.el8?arch=aarch64" } } }, { "category": "product_version", "name": "accountsservice-0:0.6.55-2.el8.aarch64", "product": { "name": "accountsservice-0:0.6.55-2.el8.aarch64", "product_id": "accountsservice-0:0.6.55-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice@0.6.55-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "accountsservice-libs-0:0.6.55-2.el8.aarch64", "product": { "name": "accountsservice-libs-0:0.6.55-2.el8.aarch64", "product_id": "accountsservice-libs-0:0.6.55-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs@0.6.55-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "product": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "product_id": "accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debugsource@0.6.55-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "product": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "product_id": "accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debuginfo@0.6.55-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "product": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "product_id": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs-debuginfo@0.6.55-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "accountsservice-devel-0:0.6.55-2.el8.aarch64", "product": { "name": "accountsservice-devel-0:0.6.55-2.el8.aarch64", "product_id": "accountsservice-devel-0:0.6.55-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-devel@0.6.55-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-shell-0:3.32.2-40.el8.aarch64", "product": { "name": "gnome-shell-0:3.32.2-40.el8.aarch64", "product_id": "gnome-shell-0:3.32.2-40.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell@3.32.2-40.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "product": { "name": "gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "product_id": "gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-debugsource@3.32.2-40.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "product": { "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "product_id": "gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-debuginfo@3.32.2-40.el8?arch=aarch64" } } }, { "category": "product_version", "name": "mutter-0:3.32.2-60.el8.aarch64", "product": { "name": "mutter-0:3.32.2-60.el8.aarch64", "product_id": "mutter-0:3.32.2-60.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter@3.32.2-60.el8?arch=aarch64" } } }, { "category": "product_version", "name": "mutter-debugsource-0:3.32.2-60.el8.aarch64", "product": { "name": "mutter-debugsource-0:3.32.2-60.el8.aarch64", "product_id": "mutter-debugsource-0:3.32.2-60.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debugsource@3.32.2-60.el8?arch=aarch64" } } }, { "category": "product_version", "name": "mutter-debuginfo-0:3.32.2-60.el8.aarch64", "product": { "name": "mutter-debuginfo-0:3.32.2-60.el8.aarch64", "product_id": "mutter-debuginfo-0:3.32.2-60.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debuginfo@3.32.2-60.el8?arch=aarch64" } } }, { "category": "product_version", "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "product": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "product_id": "mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-tests-debuginfo@3.32.2-60.el8?arch=aarch64" } } }, { "category": "product_version", "name": "mutter-devel-0:3.32.2-60.el8.aarch64", "product": { "name": "mutter-devel-0:3.32.2-60.el8.aarch64", "product_id": "mutter-devel-0:3.32.2-60.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-devel@3.32.2-60.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-control-center-0:3.28.2-28.el8.aarch64", "product": { "name": "gnome-control-center-0:3.28.2-28.el8.aarch64", "product_id": "gnome-control-center-0:3.28.2-28.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center@3.28.2-28.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "product": { "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "product_id": "gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-debugsource@3.28.2-28.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "product": { "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "product_id": "gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-debuginfo@3.28.2-28.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "product": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "product_id": "gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon@3.32.0-16.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "product": { "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "product_id": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon-debugsource@3.32.0-16.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "product": { "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "product_id": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon-debuginfo@3.32.0-16.el8?arch=aarch64" } } }, { "category": "product_version", "name": "gdm-1:40.0-15.el8.aarch64", "product": { "name": "gdm-1:40.0-15.el8.aarch64", "product_id": "gdm-1:40.0-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm@40.0-15.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debugsource-1:40.0-15.el8.aarch64", "product": { "name": "gdm-debugsource-1:40.0-15.el8.aarch64", "product_id": "gdm-debugsource-1:40.0-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debugsource@40.0-15.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debuginfo-1:40.0-15.el8.aarch64", "product": { "name": "gdm-debuginfo-1:40.0-15.el8.aarch64", "product_id": "gdm-debuginfo-1:40.0-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debuginfo@40.0-15.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.32.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.32.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.32.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.32.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.32.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.32.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.32.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.32.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.32.3-2.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "product": { "name": "gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "product_id": "gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts@3.28.2-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "product": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "product_id": "gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-devel@3.28.2-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "product": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "product_id": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debugsource@3.28.2-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "product": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "product_id": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debuginfo@3.28.2-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "LibRaw-0:0.19.5-3.el8.ppc64le", "product": { "name": "LibRaw-0:0.19.5-3.el8.ppc64le", "product_id": "LibRaw-0:0.19.5-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw@0.19.5-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "product": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "product_id": "LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-debugsource@0.19.5-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "product": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "product_id": "LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-debuginfo@0.19.5-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "product": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "product_id": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-samples-debuginfo@0.19.5-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "LibRaw-devel-0:0.19.5-3.el8.ppc64le", "product": { "name": "LibRaw-devel-0:0.19.5-3.el8.ppc64le", "product_id": "LibRaw-devel-0:0.19.5-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-devel@0.19.5-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-autoar-0:0.2.3-2.el8.ppc64le", "product": { "name": "gnome-autoar-0:0.2.3-2.el8.ppc64le", "product_id": "gnome-autoar-0:0.2.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar@0.2.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "product": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "product_id": "gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debugsource@0.2.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "product": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "product_id": "gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debuginfo@0.2.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "vino-0:3.22.0-11.el8.ppc64le", "product": { "name": "vino-0:3.22.0-11.el8.ppc64le", "product_id": "vino-0:3.22.0-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino@3.22.0-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "vino-debugsource-0:3.22.0-11.el8.ppc64le", "product": { "name": "vino-debugsource-0:3.22.0-11.el8.ppc64le", "product_id": "vino-debugsource-0:3.22.0-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino-debugsource@3.22.0-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "vino-debuginfo-0:3.22.0-11.el8.ppc64le", "product": { "name": "vino-debuginfo-0:3.22.0-11.el8.ppc64le", "product_id": "vino-debuginfo-0:3.22.0-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino-debuginfo@3.22.0-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-software-0:3.36.1-10.el8.ppc64le", "product": { "name": "gnome-software-0:3.36.1-10.el8.ppc64le", "product_id": "gnome-software-0:3.36.1-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software@3.36.1-10.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "product": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "product_id": "gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debugsource@3.36.1-10.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "product": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "product_id": "gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debuginfo@3.36.1-10.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-software-devel-0:3.36.1-10.el8.ppc64le", "product": { "name": "gnome-software-devel-0:3.36.1-10.el8.ppc64le", "product_id": "gnome-software-devel-0:3.36.1-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-devel@3.36.1-10.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "product": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "product_id": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas-devel@3.32.0-6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "product": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "product_id": "gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas@3.32.0-6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-calculator-0:3.28.2-2.el8.ppc64le", "product": { "name": "gnome-calculator-0:3.28.2-2.el8.ppc64le", "product_id": "gnome-calculator-0:3.28.2-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator@3.28.2-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "product": { "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "product_id": "gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator-debugsource@3.28.2-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "product": { "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "product_id": "gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator-debuginfo@3.28.2-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "product_id": "gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-devel-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-devel-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-devel-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debugsource@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "product_id": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache-debuginfo@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debuginfo@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel-debuginfo@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim-debuginfo@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodules-debuginfo@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "product": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "product_id": "gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-tests-debuginfo@3.22.30-8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-session-0:3.28.1-13.el8.ppc64le", "product": { "name": "gnome-session-0:3.28.1-13.el8.ppc64le", "product_id": "gnome-session-0:3.28.1-13.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session@3.28.1-13.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "product": { "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "product_id": "gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-kiosk-session@3.28.1-13.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "product": { "name": "gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "product_id": "gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-wayland-session@3.28.1-13.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "product": { "name": "gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "product_id": "gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-xsession@3.28.1-13.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "product": { "name": "gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "product_id": "gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-debugsource@3.28.1-13.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "product": { "name": "gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "product_id": "gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-debuginfo@3.28.1-13.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "accountsservice-0:0.6.55-2.el8.ppc64le", "product": { "name": "accountsservice-0:0.6.55-2.el8.ppc64le", "product_id": "accountsservice-0:0.6.55-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice@0.6.55-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "accountsservice-libs-0:0.6.55-2.el8.ppc64le", "product": { "name": "accountsservice-libs-0:0.6.55-2.el8.ppc64le", "product_id": "accountsservice-libs-0:0.6.55-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs@0.6.55-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "product": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "product_id": "accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debugsource@0.6.55-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "product": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "product_id": "accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debuginfo@0.6.55-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "product": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "product_id": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs-debuginfo@0.6.55-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "accountsservice-devel-0:0.6.55-2.el8.ppc64le", "product": { "name": "accountsservice-devel-0:0.6.55-2.el8.ppc64le", "product_id": "accountsservice-devel-0:0.6.55-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-devel@0.6.55-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-shell-0:3.32.2-40.el8.ppc64le", "product": { "name": "gnome-shell-0:3.32.2-40.el8.ppc64le", "product_id": "gnome-shell-0:3.32.2-40.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell@3.32.2-40.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "product": { "name": "gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "product_id": "gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-debugsource@3.32.2-40.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "product": { "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "product_id": "gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-debuginfo@3.32.2-40.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "mutter-0:3.32.2-60.el8.ppc64le", "product": { "name": "mutter-0:3.32.2-60.el8.ppc64le", "product_id": "mutter-0:3.32.2-60.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter@3.32.2-60.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "mutter-debugsource-0:3.32.2-60.el8.ppc64le", "product": { "name": "mutter-debugsource-0:3.32.2-60.el8.ppc64le", "product_id": "mutter-debugsource-0:3.32.2-60.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debugsource@3.32.2-60.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "product": { "name": "mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "product_id": "mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debuginfo@3.32.2-60.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "product": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "product_id": "mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-tests-debuginfo@3.32.2-60.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "mutter-devel-0:3.32.2-60.el8.ppc64le", "product": { "name": "mutter-devel-0:3.32.2-60.el8.ppc64le", "product_id": "mutter-devel-0:3.32.2-60.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-devel@3.32.2-60.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-control-center-0:3.28.2-28.el8.ppc64le", "product": { "name": "gnome-control-center-0:3.28.2-28.el8.ppc64le", "product_id": "gnome-control-center-0:3.28.2-28.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center@3.28.2-28.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "product": { "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "product_id": "gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-debugsource@3.28.2-28.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "product": { "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "product_id": "gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-debuginfo@3.28.2-28.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "product": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "product_id": "gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon@3.32.0-16.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "product": { "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "product_id": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon-debugsource@3.32.0-16.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "product": { "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "product_id": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon-debuginfo@3.32.0-16.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gdm-1:40.0-15.el8.ppc64le", "product": { "name": "gdm-1:40.0-15.el8.ppc64le", "product_id": "gdm-1:40.0-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm@40.0-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debugsource-1:40.0-15.el8.ppc64le", "product": { "name": "gdm-debugsource-1:40.0-15.el8.ppc64le", "product_id": "gdm-debugsource-1:40.0-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debugsource@40.0-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debuginfo-1:40.0-15.el8.ppc64le", "product": { "name": "gdm-debuginfo-1:40.0-15.el8.ppc64le", "product_id": "gdm-debuginfo-1:40.0-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debuginfo@40.0-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.32.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.32.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.32.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.32.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.32.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.32.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.32.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.32.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.32.3-2.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "gnome-online-accounts-0:3.28.2-3.el8.i686", "product": { "name": "gnome-online-accounts-0:3.28.2-3.el8.i686", "product_id": "gnome-online-accounts-0:3.28.2-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts@3.28.2-3.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "product": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "product_id": "gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-devel@3.28.2-3.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "product": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "product_id": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debugsource@3.28.2-3.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "product": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "product_id": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debuginfo@3.28.2-3.el8?arch=i686" } } }, { "category": "product_version", "name": "LibRaw-0:0.19.5-3.el8.i686", "product": { "name": "LibRaw-0:0.19.5-3.el8.i686", "product_id": "LibRaw-0:0.19.5-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw@0.19.5-3.el8?arch=i686" } } }, { "category": "product_version", "name": "LibRaw-debugsource-0:0.19.5-3.el8.i686", "product": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.i686", "product_id": "LibRaw-debugsource-0:0.19.5-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-debugsource@0.19.5-3.el8?arch=i686" } } }, { "category": "product_version", "name": "LibRaw-debuginfo-0:0.19.5-3.el8.i686", "product": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.i686", "product_id": "LibRaw-debuginfo-0:0.19.5-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-debuginfo@0.19.5-3.el8?arch=i686" } } }, { "category": "product_version", "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "product": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "product_id": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-samples-debuginfo@0.19.5-3.el8?arch=i686" } } }, { "category": "product_version", "name": "LibRaw-devel-0:0.19.5-3.el8.i686", "product": { "name": "LibRaw-devel-0:0.19.5-3.el8.i686", "product_id": "LibRaw-devel-0:0.19.5-3.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-devel@0.19.5-3.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-autoar-0:0.2.3-2.el8.i686", "product": { "name": "gnome-autoar-0:0.2.3-2.el8.i686", "product_id": "gnome-autoar-0:0.2.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar@0.2.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "product": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "product_id": "gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debugsource@0.2.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "product": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "product_id": "gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debuginfo@0.2.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-software-0:3.36.1-10.el8.i686", "product": { "name": "gnome-software-0:3.36.1-10.el8.i686", "product_id": "gnome-software-0:3.36.1-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software@3.36.1-10.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-software-devel-0:3.36.1-10.el8.i686", "product": { "name": "gnome-software-devel-0:3.36.1-10.el8.i686", "product_id": "gnome-software-devel-0:3.36.1-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-devel@3.36.1-10.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-software-debugsource-0:3.36.1-10.el8.i686", "product": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.i686", "product_id": "gnome-software-debugsource-0:3.36.1-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debugsource@3.36.1-10.el8?arch=i686" } } }, { "category": "product_version", "name": "gnome-software-debuginfo-0:3.36.1-10.el8.i686", "product": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.i686", "product_id": "gnome-software-debuginfo-0:3.36.1-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debuginfo@3.36.1-10.el8?arch=i686" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "product": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "product_id": "gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas@3.32.0-6.el8?arch=i686" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "product": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "product_id": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas-devel@3.32.0-6.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk3-0:3.22.30-8.el8.i686", "product": { "name": "gtk3-0:3.22.30-8.el8.i686", "product_id": "gtk3-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk3-devel-0:3.22.30-8.el8.i686", "product": { "name": "gtk3-devel-0:3.22.30-8.el8.i686", "product_id": "gtk3-devel-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk3-debugsource-0:3.22.30-8.el8.i686", "product": { "name": "gtk3-debugsource-0:3.22.30-8.el8.i686", "product_id": "gtk3-debugsource-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debugsource@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "product": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "product_id": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache-debuginfo@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk3-debuginfo-0:3.22.30-8.el8.i686", "product": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.i686", "product_id": "gtk3-debuginfo-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debuginfo@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "product": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "product_id": "gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel-debuginfo@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "product": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "product_id": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim-debuginfo@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "product": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "product_id": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodules-debuginfo@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "product": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "product_id": "gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-tests-debuginfo@3.22.30-8.el8?arch=i686" } } }, { "category": "product_version", "name": "accountsservice-libs-0:0.6.55-2.el8.i686", "product": { "name": "accountsservice-libs-0:0.6.55-2.el8.i686", "product_id": "accountsservice-libs-0:0.6.55-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs@0.6.55-2.el8?arch=i686" } } }, { "category": "product_version", "name": "accountsservice-debugsource-0:0.6.55-2.el8.i686", "product": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.i686", "product_id": "accountsservice-debugsource-0:0.6.55-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debugsource@0.6.55-2.el8?arch=i686" } } }, { "category": "product_version", "name": "accountsservice-debuginfo-0:0.6.55-2.el8.i686", "product": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.i686", "product_id": "accountsservice-debuginfo-0:0.6.55-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debuginfo@0.6.55-2.el8?arch=i686" } } }, { "category": "product_version", "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "product": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "product_id": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs-debuginfo@0.6.55-2.el8?arch=i686" } } }, { "category": "product_version", "name": "accountsservice-devel-0:0.6.55-2.el8.i686", "product": { "name": "accountsservice-devel-0:0.6.55-2.el8.i686", "product_id": "accountsservice-devel-0:0.6.55-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-devel@0.6.55-2.el8?arch=i686" } } }, { "category": "product_version", "name": "mutter-0:3.32.2-60.el8.i686", "product": { "name": "mutter-0:3.32.2-60.el8.i686", "product_id": "mutter-0:3.32.2-60.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter@3.32.2-60.el8?arch=i686" } } }, { "category": "product_version", "name": "mutter-debugsource-0:3.32.2-60.el8.i686", "product": { "name": "mutter-debugsource-0:3.32.2-60.el8.i686", "product_id": "mutter-debugsource-0:3.32.2-60.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debugsource@3.32.2-60.el8?arch=i686" } } }, { "category": "product_version", "name": "mutter-debuginfo-0:3.32.2-60.el8.i686", "product": { "name": "mutter-debuginfo-0:3.32.2-60.el8.i686", "product_id": "mutter-debuginfo-0:3.32.2-60.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debuginfo@3.32.2-60.el8?arch=i686" } } }, { "category": "product_version", "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "product": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "product_id": "mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-tests-debuginfo@3.32.2-60.el8?arch=i686" } } }, { "category": "product_version", "name": "mutter-devel-0:3.32.2-60.el8.i686", "product": { "name": "mutter-devel-0:3.32.2-60.el8.i686", "product_id": "mutter-devel-0:3.32.2-60.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-devel@3.32.2-60.el8?arch=i686" } } }, { "category": "product_version", "name": "gdm-1:40.0-15.el8.i686", "product": { "name": "gdm-1:40.0-15.el8.i686", "product_id": "gdm-1:40.0-15.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm@40.0-15.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debugsource-1:40.0-15.el8.i686", "product": { "name": "gdm-debugsource-1:40.0-15.el8.i686", "product_id": "gdm-debugsource-1:40.0-15.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debugsource@40.0-15.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debuginfo-1:40.0-15.el8.i686", "product": { "name": "gdm-debuginfo-1:40.0-15.el8.i686", "product_id": "gdm-debuginfo-1:40.0-15.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debuginfo@40.0-15.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.32.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-devel-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.32.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.32.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.32.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.32.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.32.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.32.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.32.3-2.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.32.3-2.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "gnome-online-accounts-0:3.28.2-3.el8.x86_64", "product": { "name": "gnome-online-accounts-0:3.28.2-3.el8.x86_64", "product_id": "gnome-online-accounts-0:3.28.2-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts@3.28.2-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "product": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "product_id": "gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-devel@3.28.2-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "product": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "product_id": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debugsource@3.28.2-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "product": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "product_id": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debuginfo@3.28.2-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "LibRaw-0:0.19.5-3.el8.x86_64", "product": { "name": "LibRaw-0:0.19.5-3.el8.x86_64", "product_id": "LibRaw-0:0.19.5-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw@0.19.5-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "product": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "product_id": "LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-debugsource@0.19.5-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "product": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "product_id": "LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-debuginfo@0.19.5-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "product": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "product_id": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-samples-debuginfo@0.19.5-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "LibRaw-devel-0:0.19.5-3.el8.x86_64", "product": { "name": "LibRaw-devel-0:0.19.5-3.el8.x86_64", "product_id": "LibRaw-devel-0:0.19.5-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/LibRaw-devel@0.19.5-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-autoar-0:0.2.3-2.el8.x86_64", "product": { "name": "gnome-autoar-0:0.2.3-2.el8.x86_64", "product_id": "gnome-autoar-0:0.2.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar@0.2.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "product": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "product_id": "gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debugsource@0.2.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "product": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "product_id": "gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debuginfo@0.2.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "vino-0:3.22.0-11.el8.x86_64", "product": { "name": "vino-0:3.22.0-11.el8.x86_64", "product_id": "vino-0:3.22.0-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino@3.22.0-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "vino-debugsource-0:3.22.0-11.el8.x86_64", "product": { "name": "vino-debugsource-0:3.22.0-11.el8.x86_64", "product_id": "vino-debugsource-0:3.22.0-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino-debugsource@3.22.0-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "vino-debuginfo-0:3.22.0-11.el8.x86_64", "product": { "name": "vino-debuginfo-0:3.22.0-11.el8.x86_64", "product_id": "vino-debuginfo-0:3.22.0-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino-debuginfo@3.22.0-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-software-0:3.36.1-10.el8.x86_64", "product": { "name": "gnome-software-0:3.36.1-10.el8.x86_64", "product_id": "gnome-software-0:3.36.1-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software@3.36.1-10.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "product": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "product_id": "gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debugsource@3.36.1-10.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "product": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "product_id": "gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debuginfo@3.36.1-10.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-software-devel-0:3.36.1-10.el8.x86_64", "product": { "name": "gnome-software-devel-0:3.36.1-10.el8.x86_64", "product_id": "gnome-software-devel-0:3.36.1-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-devel@3.36.1-10.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "product": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "product_id": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas-devel@3.32.0-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "product": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "product_id": "gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas@3.32.0-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-calculator-0:3.28.2-2.el8.x86_64", "product": { "name": "gnome-calculator-0:3.28.2-2.el8.x86_64", "product_id": "gnome-calculator-0:3.28.2-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator@3.28.2-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "product": { "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "product_id": "gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator-debugsource@3.28.2-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "product": { "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "product_id": "gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator-debuginfo@3.28.2-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "product_id": "gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-devel-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-devel-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-devel-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-debugsource-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-debugsource-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-debugsource-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debugsource@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "product_id": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache-debuginfo@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debuginfo@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel-debuginfo@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim-debuginfo@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodules-debuginfo@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "product": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "product_id": "gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-tests-debuginfo@3.22.30-8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-session-0:3.28.1-13.el8.x86_64", "product": { "name": "gnome-session-0:3.28.1-13.el8.x86_64", "product_id": "gnome-session-0:3.28.1-13.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session@3.28.1-13.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "product": { "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "product_id": "gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-kiosk-session@3.28.1-13.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "product": { "name": "gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "product_id": "gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-wayland-session@3.28.1-13.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-session-xsession-0:3.28.1-13.el8.x86_64", "product": { "name": "gnome-session-xsession-0:3.28.1-13.el8.x86_64", "product_id": "gnome-session-xsession-0:3.28.1-13.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-xsession@3.28.1-13.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "product": { "name": "gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "product_id": "gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-debugsource@3.28.1-13.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "product": { "name": "gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "product_id": "gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-debuginfo@3.28.1-13.el8?arch=x86_64" } } }, { "category": "product_version", "name": "accountsservice-0:0.6.55-2.el8.x86_64", "product": { "name": "accountsservice-0:0.6.55-2.el8.x86_64", "product_id": "accountsservice-0:0.6.55-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice@0.6.55-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "accountsservice-libs-0:0.6.55-2.el8.x86_64", "product": { "name": "accountsservice-libs-0:0.6.55-2.el8.x86_64", "product_id": "accountsservice-libs-0:0.6.55-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs@0.6.55-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "product": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "product_id": "accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debugsource@0.6.55-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "product": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "product_id": "accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debuginfo@0.6.55-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "product": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "product_id": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs-debuginfo@0.6.55-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "accountsservice-devel-0:0.6.55-2.el8.x86_64", "product": { "name": "accountsservice-devel-0:0.6.55-2.el8.x86_64", "product_id": "accountsservice-devel-0:0.6.55-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-devel@0.6.55-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-shell-0:3.32.2-40.el8.x86_64", "product": { "name": "gnome-shell-0:3.32.2-40.el8.x86_64", "product_id": "gnome-shell-0:3.32.2-40.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell@3.32.2-40.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "product": { "name": "gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "product_id": "gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-debugsource@3.32.2-40.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "product": { "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "product_id": "gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-debuginfo@3.32.2-40.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mutter-0:3.32.2-60.el8.x86_64", "product": { "name": "mutter-0:3.32.2-60.el8.x86_64", "product_id": "mutter-0:3.32.2-60.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter@3.32.2-60.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mutter-debugsource-0:3.32.2-60.el8.x86_64", "product": { "name": "mutter-debugsource-0:3.32.2-60.el8.x86_64", "product_id": "mutter-debugsource-0:3.32.2-60.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debugsource@3.32.2-60.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mutter-debuginfo-0:3.32.2-60.el8.x86_64", "product": { "name": "mutter-debuginfo-0:3.32.2-60.el8.x86_64", "product_id": "mutter-debuginfo-0:3.32.2-60.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debuginfo@3.32.2-60.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "product": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "product_id": "mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-tests-debuginfo@3.32.2-60.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mutter-devel-0:3.32.2-60.el8.x86_64", "product": { "name": "mutter-devel-0:3.32.2-60.el8.x86_64", "product_id": "mutter-devel-0:3.32.2-60.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-devel@3.32.2-60.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-control-center-0:3.28.2-28.el8.x86_64", "product": { "name": "gnome-control-center-0:3.28.2-28.el8.x86_64", "product_id": "gnome-control-center-0:3.28.2-28.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center@3.28.2-28.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "product": { "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "product_id": "gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-debugsource@3.28.2-28.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "product": { "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "product_id": "gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-debuginfo@3.28.2-28.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "product": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "product_id": "gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon@3.32.0-16.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "product": { "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "product_id": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon-debugsource@3.32.0-16.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "product": { "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "product_id": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon-debuginfo@3.32.0-16.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gdm-1:40.0-15.el8.x86_64", "product": { "name": "gdm-1:40.0-15.el8.x86_64", "product_id": "gdm-1:40.0-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm@40.0-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debugsource-1:40.0-15.el8.x86_64", "product": { "name": "gdm-debugsource-1:40.0-15.el8.x86_64", "product_id": "gdm-debugsource-1:40.0-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debugsource@40.0-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debuginfo-1:40.0-15.el8.x86_64", "product": { "name": "gdm-debuginfo-1:40.0-15.el8.x86_64", "product_id": "gdm-debuginfo-1:40.0-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debuginfo@40.0-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.32.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.32.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.32.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.32.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.32.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.32.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.32.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.32.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.32.3-2.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gnome-online-accounts-0:3.28.2-3.el8.s390x", "product": { "name": "gnome-online-accounts-0:3.28.2-3.el8.s390x", "product_id": "gnome-online-accounts-0:3.28.2-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts@3.28.2-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "product": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "product_id": "gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-devel@3.28.2-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "product": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "product_id": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debugsource@3.28.2-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "product": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "product_id": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-online-accounts-debuginfo@3.28.2-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-autoar-0:0.2.3-2.el8.s390x", "product": { "name": "gnome-autoar-0:0.2.3-2.el8.s390x", "product_id": "gnome-autoar-0:0.2.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar@0.2.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "product": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "product_id": "gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debugsource@0.2.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "product": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "product_id": "gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-autoar-debuginfo@0.2.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "vino-0:3.22.0-11.el8.s390x", "product": { "name": "vino-0:3.22.0-11.el8.s390x", "product_id": "vino-0:3.22.0-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino@3.22.0-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "vino-debugsource-0:3.22.0-11.el8.s390x", "product": { "name": "vino-debugsource-0:3.22.0-11.el8.s390x", "product_id": "vino-debugsource-0:3.22.0-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino-debugsource@3.22.0-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "vino-debuginfo-0:3.22.0-11.el8.s390x", "product": { "name": "vino-debuginfo-0:3.22.0-11.el8.s390x", "product_id": "vino-debuginfo-0:3.22.0-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vino-debuginfo@3.22.0-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-software-0:3.36.1-10.el8.s390x", "product": { "name": "gnome-software-0:3.36.1-10.el8.s390x", "product_id": "gnome-software-0:3.36.1-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software@3.36.1-10.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-software-debugsource-0:3.36.1-10.el8.s390x", "product": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.s390x", "product_id": "gnome-software-debugsource-0:3.36.1-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debugsource@3.36.1-10.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "product": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "product_id": "gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-debuginfo@3.36.1-10.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-software-devel-0:3.36.1-10.el8.s390x", "product": { "name": "gnome-software-devel-0:3.36.1-10.el8.s390x", "product_id": "gnome-software-devel-0:3.36.1-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-software-devel@3.36.1-10.el8?arch=s390x" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "product": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "product_id": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas-devel@3.32.0-6.el8?arch=s390x" } } }, { "category": "product_version", "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "product": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "product_id": "gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gsettings-desktop-schemas@3.32.0-6.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-calculator-0:3.28.2-2.el8.s390x", "product": { "name": "gnome-calculator-0:3.28.2-2.el8.s390x", "product_id": "gnome-calculator-0:3.28.2-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator@3.28.2-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "product": { "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "product_id": "gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator-debugsource@3.28.2-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "product": { "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "product_id": "gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-calculator-debuginfo@3.28.2-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "product": { "name": "gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "product_id": "gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-0:3.22.30-8.el8.s390x", "product_id": "gtk3-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-devel-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-devel-0:3.22.30-8.el8.s390x", "product_id": "gtk3-devel-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "product_id": "gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-debugsource-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-debugsource-0:3.22.30-8.el8.s390x", "product_id": "gtk3-debugsource-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debugsource@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "product": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "product_id": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk-update-icon-cache-debuginfo@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-debuginfo-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.s390x", "product_id": "gtk3-debuginfo-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-debuginfo@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "product_id": "gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-devel-debuginfo@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "product_id": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodule-xim-debuginfo@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "product_id": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-immodules-debuginfo@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "product": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "product_id": "gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gtk3-tests-debuginfo@3.22.30-8.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-session-0:3.28.1-13.el8.s390x", "product": { "name": "gnome-session-0:3.28.1-13.el8.s390x", "product_id": "gnome-session-0:3.28.1-13.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session@3.28.1-13.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "product": { "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "product_id": "gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-kiosk-session@3.28.1-13.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "product": { "name": "gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "product_id": "gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-wayland-session@3.28.1-13.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-session-xsession-0:3.28.1-13.el8.s390x", "product": { "name": "gnome-session-xsession-0:3.28.1-13.el8.s390x", "product_id": "gnome-session-xsession-0:3.28.1-13.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-xsession@3.28.1-13.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-session-debugsource-0:3.28.1-13.el8.s390x", "product": { "name": "gnome-session-debugsource-0:3.28.1-13.el8.s390x", "product_id": "gnome-session-debugsource-0:3.28.1-13.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-debugsource@3.28.1-13.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "product": { "name": "gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "product_id": "gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-session-debuginfo@3.28.1-13.el8?arch=s390x" } } }, { "category": "product_version", "name": "accountsservice-0:0.6.55-2.el8.s390x", "product": { "name": "accountsservice-0:0.6.55-2.el8.s390x", "product_id": "accountsservice-0:0.6.55-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice@0.6.55-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "accountsservice-libs-0:0.6.55-2.el8.s390x", "product": { "name": "accountsservice-libs-0:0.6.55-2.el8.s390x", "product_id": "accountsservice-libs-0:0.6.55-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs@0.6.55-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "accountsservice-debugsource-0:0.6.55-2.el8.s390x", "product": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.s390x", "product_id": "accountsservice-debugsource-0:0.6.55-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debugsource@0.6.55-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "product": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "product_id": "accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-debuginfo@0.6.55-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "product": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "product_id": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-libs-debuginfo@0.6.55-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "accountsservice-devel-0:0.6.55-2.el8.s390x", "product": { "name": "accountsservice-devel-0:0.6.55-2.el8.s390x", "product_id": "accountsservice-devel-0:0.6.55-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/accountsservice-devel@0.6.55-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-shell-0:3.32.2-40.el8.s390x", "product": { "name": "gnome-shell-0:3.32.2-40.el8.s390x", "product_id": "gnome-shell-0:3.32.2-40.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell@3.32.2-40.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "product": { "name": "gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "product_id": "gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-debugsource@3.32.2-40.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "product": { "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "product_id": "gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-debuginfo@3.32.2-40.el8?arch=s390x" } } }, { "category": "product_version", "name": "mutter-0:3.32.2-60.el8.s390x", "product": { "name": "mutter-0:3.32.2-60.el8.s390x", "product_id": "mutter-0:3.32.2-60.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter@3.32.2-60.el8?arch=s390x" } } }, { "category": "product_version", "name": "mutter-debugsource-0:3.32.2-60.el8.s390x", "product": { "name": "mutter-debugsource-0:3.32.2-60.el8.s390x", "product_id": "mutter-debugsource-0:3.32.2-60.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debugsource@3.32.2-60.el8?arch=s390x" } } }, { "category": "product_version", "name": "mutter-debuginfo-0:3.32.2-60.el8.s390x", "product": { "name": "mutter-debuginfo-0:3.32.2-60.el8.s390x", "product_id": "mutter-debuginfo-0:3.32.2-60.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-debuginfo@3.32.2-60.el8?arch=s390x" } } }, { "category": "product_version", "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "product": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "product_id": "mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-tests-debuginfo@3.32.2-60.el8?arch=s390x" } } }, { "category": "product_version", "name": "mutter-devel-0:3.32.2-60.el8.s390x", "product": { "name": "mutter-devel-0:3.32.2-60.el8.s390x", "product_id": "mutter-devel-0:3.32.2-60.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutter-devel@3.32.2-60.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-control-center-0:3.28.2-28.el8.s390x", "product": { "name": "gnome-control-center-0:3.28.2-28.el8.s390x", "product_id": "gnome-control-center-0:3.28.2-28.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center@3.28.2-28.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "product": { "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "product_id": "gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-debugsource@3.28.2-28.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "product": { "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "product_id": "gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-debuginfo@3.28.2-28.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-settings-daemon-0:3.32.0-16.el8.s390x", "product": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.s390x", "product_id": "gnome-settings-daemon-0:3.32.0-16.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon@3.32.0-16.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "product": { "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "product_id": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon-debugsource@3.32.0-16.el8?arch=s390x" } } }, { "category": "product_version", "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "product": { "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "product_id": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-settings-daemon-debuginfo@3.32.0-16.el8?arch=s390x" } } }, { "category": "product_version", "name": "gdm-1:40.0-15.el8.s390x", "product": { "name": "gdm-1:40.0-15.el8.s390x", "product_id": "gdm-1:40.0-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm@40.0-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debugsource-1:40.0-15.el8.s390x", "product": { "name": "gdm-debugsource-1:40.0-15.el8.s390x", "product_id": "gdm-debugsource-1:40.0-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debugsource@40.0-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "gdm-debuginfo-1:40.0-15.el8.s390x", "product": { "name": "gdm-debuginfo-1:40.0-15.el8.s390x", "product_id": "gdm-debuginfo-1:40.0-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gdm-debuginfo@40.0-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.32.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.32.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.32.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.32.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.32.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.32.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.32.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.32.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.32.3-2.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnome-classic-session-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-classic-session-0:3.32.1-20.el8.noarch", "product_id": "gnome-classic-session-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-classic-session@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-apps-menu@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-auto-move-windows@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-common@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-dash-to-dock@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-desktop-icons@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-disable-screenshield@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-drive-menu@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-gesture-inhibitor@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-horizontal-workspaces@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-launch-new-instance@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-native-window-placement@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-no-hot-corner@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-panel-favorites@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-places-menu@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-screenshot-window-sizer@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-systemMonitor@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-top-icons@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-updates-dialog@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-user-theme@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-window-grouper@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-window-list@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-windowsNavigator@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "product": { "name": "gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "product_id": "gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-shell-extension-workspace-indicator@3.32.1-20.el8?arch=noarch" } } }, { "category": "product_version", "name": "gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "product": { "name": "gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "product_id": "gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnome-control-center-filesystem@3.28.2-28.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "LibRaw-0:0.19.5-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-0:0.19.5-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-0:0.19.5-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-0:0.19.5-3.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src" }, "product_reference": "LibRaw-0:0.19.5-3.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-0:0.19.5-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-debuginfo-0:0.19.5-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-debugsource-0:0.19.5-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-devel-0:0.19.5-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-devel-0:0.19.5-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-devel-0:0.19.5-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-devel-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-devel-0:0.19.5-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-devel-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src" }, "product_reference": "accountsservice-0:0.6.55-2.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-1:40.0-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64" }, "product_reference": "gdm-1:40.0-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-1:40.0-15.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686" }, "product_reference": "gdm-1:40.0-15.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-1:40.0-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le" }, "product_reference": "gdm-1:40.0-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-1:40.0-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x" }, "product_reference": "gdm-1:40.0-15.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-1:40.0-15.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src" }, "product_reference": "gdm-1:40.0-15.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-1:40.0-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64" }, "product_reference": "gdm-1:40.0-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debuginfo-1:40.0-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64" }, "product_reference": "gdm-debuginfo-1:40.0-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debuginfo-1:40.0-15.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686" }, "product_reference": "gdm-debuginfo-1:40.0-15.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debuginfo-1:40.0-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le" }, "product_reference": "gdm-debuginfo-1:40.0-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debuginfo-1:40.0-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x" }, "product_reference": "gdm-debuginfo-1:40.0-15.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debuginfo-1:40.0-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64" }, "product_reference": "gdm-debuginfo-1:40.0-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debugsource-1:40.0-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64" }, "product_reference": "gdm-debugsource-1:40.0-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debugsource-1:40.0-15.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686" }, "product_reference": "gdm-debugsource-1:40.0-15.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debugsource-1:40.0-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le" }, "product_reference": "gdm-debugsource-1:40.0-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debugsource-1:40.0-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x" }, "product_reference": "gdm-debugsource-1:40.0-15.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gdm-debugsource-1:40.0-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64" }, "product_reference": "gdm-debugsource-1:40.0-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-0:0.2.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64" }, "product_reference": "gnome-autoar-0:0.2.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-0:0.2.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686" }, "product_reference": "gnome-autoar-0:0.2.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-0:0.2.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le" }, "product_reference": "gnome-autoar-0:0.2.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-0:0.2.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x" }, "product_reference": "gnome-autoar-0:0.2.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-0:0.2.3-2.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src" }, "product_reference": "gnome-autoar-0:0.2.3-2.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-0:0.2.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64" }, "product_reference": "gnome-autoar-0:0.2.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64" }, "product_reference": "gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686" }, "product_reference": "gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le" }, "product_reference": "gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x" }, "product_reference": "gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64" }, "product_reference": "gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64" }, "product_reference": "gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686" }, "product_reference": "gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le" }, "product_reference": "gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x" }, "product_reference": "gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64" }, "product_reference": "gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-0:3.28.2-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64" }, "product_reference": "gnome-calculator-0:3.28.2-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-0:3.28.2-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le" }, "product_reference": "gnome-calculator-0:3.28.2-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-0:3.28.2-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x" }, "product_reference": "gnome-calculator-0:3.28.2-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-0:3.28.2-2.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src" }, "product_reference": "gnome-calculator-0:3.28.2-2.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-0:3.28.2-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64" }, "product_reference": "gnome-calculator-0:3.28.2-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64" }, "product_reference": "gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le" }, "product_reference": "gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x" }, "product_reference": "gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64" }, "product_reference": "gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64" }, "product_reference": "gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le" }, "product_reference": "gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x" }, "product_reference": "gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64" }, "product_reference": "gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-classic-session-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-classic-session-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-0:3.28.2-28.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64" }, "product_reference": "gnome-control-center-0:3.28.2-28.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-0:3.28.2-28.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le" }, "product_reference": "gnome-control-center-0:3.28.2-28.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-0:3.28.2-28.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x" }, "product_reference": "gnome-control-center-0:3.28.2-28.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-0:3.28.2-28.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src" }, "product_reference": "gnome-control-center-0:3.28.2-28.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-0:3.28.2-28.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64" }, "product_reference": "gnome-control-center-0:3.28.2-28.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64" }, "product_reference": "gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le" }, "product_reference": "gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x" }, "product_reference": "gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64" }, "product_reference": "gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64" }, "product_reference": "gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le" }, "product_reference": "gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x" }, "product_reference": "gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64" }, "product_reference": "gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-control-center-filesystem-0:3.28.2-28.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch" }, "product_reference": "gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-0:3.28.2-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64" }, "product_reference": "gnome-online-accounts-0:3.28.2-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-0:3.28.2-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686" }, "product_reference": "gnome-online-accounts-0:3.28.2-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-0:3.28.2-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le" }, "product_reference": "gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-0:3.28.2-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x" }, "product_reference": "gnome-online-accounts-0:3.28.2-3.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-0:3.28.2-3.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src" }, "product_reference": "gnome-online-accounts-0:3.28.2-3.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-0:3.28.2-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64" }, "product_reference": "gnome-online-accounts-0:3.28.2-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64" }, "product_reference": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686" }, "product_reference": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le" }, "product_reference": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x" }, "product_reference": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64" }, "product_reference": "gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64" }, "product_reference": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686" }, "product_reference": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le" }, "product_reference": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x" }, "product_reference": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64" }, "product_reference": "gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64" }, "product_reference": "gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686" }, "product_reference": "gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le" }, "product_reference": "gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x" }, "product_reference": "gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64" }, "product_reference": "gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-0:3.28.1-13.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64" }, "product_reference": "gnome-session-0:3.28.1-13.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-0:3.28.1-13.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le" }, "product_reference": "gnome-session-0:3.28.1-13.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-0:3.28.1-13.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x" }, "product_reference": "gnome-session-0:3.28.1-13.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-0:3.28.1-13.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src" }, "product_reference": "gnome-session-0:3.28.1-13.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-0:3.28.1-13.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64" }, "product_reference": "gnome-session-0:3.28.1-13.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-debuginfo-0:3.28.1-13.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64" }, "product_reference": "gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le" }, "product_reference": "gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-debuginfo-0:3.28.1-13.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x" }, "product_reference": "gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-debuginfo-0:3.28.1-13.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64" }, "product_reference": "gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-debugsource-0:3.28.1-13.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64" }, "product_reference": "gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-debugsource-0:3.28.1-13.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le" }, "product_reference": "gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-debugsource-0:3.28.1-13.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x" }, "product_reference": "gnome-session-debugsource-0:3.28.1-13.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-debugsource-0:3.28.1-13.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64" }, "product_reference": "gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64" }, "product_reference": "gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le" }, "product_reference": "gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x" }, "product_reference": "gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64" }, "product_reference": "gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-wayland-session-0:3.28.1-13.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64" }, "product_reference": "gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le" }, "product_reference": "gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-wayland-session-0:3.28.1-13.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x" }, "product_reference": "gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-wayland-session-0:3.28.1-13.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64" }, "product_reference": "gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-xsession-0:3.28.1-13.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64" }, "product_reference": "gnome-session-xsession-0:3.28.1-13.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-xsession-0:3.28.1-13.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le" }, "product_reference": "gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-xsession-0:3.28.1-13.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x" }, "product_reference": "gnome-session-xsession-0:3.28.1-13.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-session-xsession-0:3.28.1-13.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64" }, "product_reference": "gnome-session-xsession-0:3.28.1-13.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64" }, "product_reference": "gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le" }, "product_reference": "gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x" }, "product_reference": "gnome-settings-daemon-0:3.32.0-16.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src" }, "product_reference": "gnome-settings-daemon-0:3.32.0-16.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-0:3.32.0-16.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64" }, "product_reference": "gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64" }, "product_reference": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le" }, "product_reference": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x" }, "product_reference": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64" }, "product_reference": "gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64" }, "product_reference": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le" }, "product_reference": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x" }, "product_reference": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64" }, "product_reference": "gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-0:3.32.2-40.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64" }, "product_reference": "gnome-shell-0:3.32.2-40.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-0:3.32.2-40.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le" }, "product_reference": "gnome-shell-0:3.32.2-40.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-0:3.32.2-40.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x" }, "product_reference": "gnome-shell-0:3.32.2-40.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-0:3.32.2-40.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src" }, "product_reference": "gnome-shell-0:3.32.2-40.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-0:3.32.2-40.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64" }, "product_reference": "gnome-shell-0:3.32.2-40.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64" }, "product_reference": "gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le" }, "product_reference": "gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x" }, "product_reference": "gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64" }, "product_reference": "gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-debugsource-0:3.32.2-40.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64" }, "product_reference": "gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le" }, "product_reference": "gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-debugsource-0:3.32.2-40.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x" }, "product_reference": "gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-debugsource-0:3.32.2-40.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64" }, "product_reference": "gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-common-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch" }, "product_reference": "gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-shell-extensions-0:3.32.1-20.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src" }, "product_reference": "gnome-shell-extensions-0:3.32.1-20.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64" }, "product_reference": "gnome-software-0:3.36.1-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686" }, "product_reference": "gnome-software-0:3.36.1-10.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le" }, "product_reference": "gnome-software-0:3.36.1-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x" }, "product_reference": "gnome-software-0:3.36.1-10.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src" }, "product_reference": "gnome-software-0:3.36.1-10.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64" }, "product_reference": "gnome-software-0:3.36.1-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686" }, "product_reference": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686" }, "product_reference": "gtk3-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-0:3.22.30-8.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src" }, "product_reference": "gtk3-0:3.22.30-8.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686" }, "product_reference": "gtk3-debuginfo-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-debuginfo-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debuginfo-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debugsource-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-debugsource-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debugsource-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686" }, "product_reference": "gtk3-debugsource-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debugsource-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debugsource-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-debugsource-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-debugsource-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-debugsource-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-devel-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686" }, "product_reference": "gtk3-devel-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-devel-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-devel-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-devel-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686" }, "product_reference": "gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686" }, "product_reference": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686" }, "product_reference": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64" }, "product_reference": "gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686" }, "product_reference": "gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le" }, "product_reference": "gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x" }, "product_reference": "gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64" }, "product_reference": "gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-0:3.32.2-60.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src" }, "product_reference": "mutter-0:3.32.2-60.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-0:3.22.0-11.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64" }, "product_reference": "vino-0:3.22.0-11.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-0:3.22.0-11.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le" }, "product_reference": "vino-0:3.22.0-11.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-0:3.22.0-11.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x" }, "product_reference": "vino-0:3.22.0-11.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-0:3.22.0-11.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src" }, "product_reference": "vino-0:3.22.0-11.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-0:3.22.0-11.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64" }, "product_reference": "vino-0:3.22.0-11.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-debuginfo-0:3.22.0-11.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64" }, "product_reference": "vino-debuginfo-0:3.22.0-11.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-debuginfo-0:3.22.0-11.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le" }, "product_reference": "vino-debuginfo-0:3.22.0-11.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-debuginfo-0:3.22.0-11.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x" }, "product_reference": "vino-debuginfo-0:3.22.0-11.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-debuginfo-0:3.22.0-11.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64" }, "product_reference": "vino-debuginfo-0:3.22.0-11.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-debugsource-0:3.22.0-11.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64" }, "product_reference": "vino-debugsource-0:3.22.0-11.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-debugsource-0:3.22.0-11.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le" }, "product_reference": "vino-debugsource-0:3.22.0-11.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-debugsource-0:3.22.0-11.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x" }, "product_reference": "vino-debugsource-0:3.22.0-11.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "vino-debugsource-0:3.22.0-11.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64" }, "product_reference": "vino-debugsource-0:3.22.0-11.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.32.3-2.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src" }, "product_reference": "webkit2gtk3-0:2.32.3-2.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-devel-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.src", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64" }, "product_reference": "gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64" }, "product_reference": "gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-0:0.19.5-3.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-0:0.19.5-3.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-0:0.19.5-3.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-0:0.19.5-3.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src" }, "product_reference": "LibRaw-0:0.19.5-3.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-0:0.19.5-3.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-debuginfo-0:0.19.5-3.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debuginfo-0:0.19.5-3.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-debugsource-0:0.19.5-3.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-debugsource-0:0.19.5-3.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-devel-0:0.19.5-3.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-devel-0:0.19.5-3.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-devel-0:0.19.5-3.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-devel-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-devel-0:0.19.5-3.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-devel-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686" }, "product_reference": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le" }, "product_reference": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64" }, "product_reference": "LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src" }, "product_reference": "accountsservice-0:0.6.55-2.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-0:0.6.55-2.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debuginfo-0:0.6.55-2.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-debugsource-0:0.6.55-2.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-devel-0:0.6.55-2.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-devel-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-0:0.6.55-2.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-libs-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64" }, "product_reference": "accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64" }, "product_reference": "gnome-software-0:3.36.1-10.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686" }, "product_reference": "gnome-software-0:3.36.1-10.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le" }, "product_reference": "gnome-software-0:3.36.1-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x" }, "product_reference": "gnome-software-0:3.36.1-10.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src" }, "product_reference": "gnome-software-0:3.36.1-10.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-0:3.36.1-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64" }, "product_reference": "gnome-software-0:3.36.1-10.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debuginfo-0:3.36.1-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64" }, "product_reference": "gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-debugsource-0:3.36.1-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64" }, "product_reference": "gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "gnome-software-devel-0:3.36.1-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64" }, "product_reference": "gnome-software-devel-0:3.36.1-10.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-0:3.32.2-60.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src" }, "product_reference": "mutter-0:3.32.2-60.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-0:3.32.2-60.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debuginfo-0:3.32.2-60.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-debuginfo-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-debugsource-0:3.32.2-60.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-debugsource-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-devel-0:3.32.2-60.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-devel-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" }, "product_reference": "mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-02-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928886" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13558" }, { "category": "external", "summary": "RHBZ#1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0001.html", "url": "https://webkitgtk.org/security/WSA-2021-0001.html" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:30:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nGDM must be restarted for this update to take effect. The GNOME session must be restarted (log out, then log back in) for this update to take effect.", "product_ids": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4381" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution" }, { "cve": "CVE-2020-24870", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-02-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928794" } ], "notes": [ { "category": "description", "text": "A stack buffer overflow vulnerability was found in LibRaw. This flaw allows a malicious user to send a crafted image that, when parsed by an application linked to LibRaw, leads to a denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp", "title": "Vulnerability summary" }, { "category": "other", "text": "LibRaw is not supposed to be used in RHEL by network-facing applications, thus reducing the impact of this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24870" }, { "category": "external", "summary": "RHBZ#1928794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24870", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24870" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24870", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24870" } ], "release_date": "2020-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:30:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nGDM must be restarted for this update to take effect. The GNOME session must be restarted (log out, then log back in) for this update to take effect.", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4381" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp" }, { "cve": "CVE-2020-27918", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944323" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "RHBZ#1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:30:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nGDM must be restarted for this update to take effect. The GNOME session must be restarted (log out, then log back in) for this update to take effect.", "product_ids": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4381" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2020-29623", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-03-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944329" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User may be unable to fully delete browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29623" }, { "category": "external", "summary": "RHBZ#1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:30:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nGDM must be restarted for this update to take effect. The GNOME session must be restarted (log out, then log back in) for this update to take effect.", "product_ids": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4381" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: User may be unable to fully delete browsing history" }, { "cve": "CVE-2020-36241", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-02-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925640" } ], "notes": [ { "category": "description", "text": "autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file\u0027s parent is a symlink to a directory outside of the intended extraction location.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36241" }, { "category": "external", "summary": "RHBZ#1925640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36241", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36241" } ], "release_date": "2020-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:30:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nGDM must be restarted for this update to take effect. The GNOME session must be restarted (log out, then log back in) for this update to take effect.", "product_ids": [ "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4381" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory" }, { "cve": "CVE-2021-1765", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944333" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1765" }, { "category": "external", "summary": "RHBZ#1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1765" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:30:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nGDM must be restarted for this update to take effect. The GNOME session must be restarted (log out, then log back in) for this update to take effect.", "product_ids": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4381" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1788", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944859" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "RHBZ#1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:30:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nGDM must be restarted for this update to take effect. The GNOME session must be restarted (log out, then log back in) for this update to take effect.", "product_ids": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4381" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-1789", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-03-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944337" } ], "notes": [ { "category": "description", "text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1789" }, { "category": "external", "summary": "RHBZ#1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:30:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nGDM must be restarted for this update to take effect. The GNOME session must be restarted (log out, then log back in) for this update to take effect.", "product_ids": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4381" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1799", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.src", "AppStream-8.5.0.GA:gnome-shell-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debuginfo-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.aarch64", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.ppc64le", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.s390x", "AppStream-8.5.0.GA:gnome-shell-debugsource-0:3.32.2-40.el8.x86_64", "AppStream-8.5.0.GA:gnome-shell-extension-apps-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-auto-move-windows-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-common-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-dash-to-dock-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-desktop-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-disable-screenshield-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-drive-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-gesture-inhibitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-horizontal-workspaces-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-launch-new-instance-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-native-window-placement-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-no-hot-corner-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-panel-favorites-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-places-menu-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-screenshot-window-sizer-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-systemMonitor-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-top-icons-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-updates-dialog-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-user-theme-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-grouper-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-window-list-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-windowsNavigator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extension-workspace-indicator-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-shell-extensions-0:3.32.1-20.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "AppStream-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "AppStream-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "AppStream-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "AppStream-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk-update-icon-cache-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.src", "AppStream-8.5.0.GA:gtk3-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-debugsource-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-devel-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodule-xim-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-immodules-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.aarch64", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.i686", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.ppc64le", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.s390x", "AppStream-8.5.0.GA:gtk3-tests-debuginfo-0:3.22.30-8.el8.x86_64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "AppStream-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "AppStream-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.src", "AppStream-8.5.0.GA:vino-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debuginfo-0:3.22.0-11.el8.x86_64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.aarch64", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.ppc64le", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.s390x", "AppStream-8.5.0.GA:vino-debugsource-0:3.22.0-11.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.src", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-0:3.32.0-6.el8.x86_64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.aarch64", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.i686", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.ppc64le", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.s390x", "BaseOS-8.5.0.GA:gsettings-desktop-schemas-devel-0:3.32.0-6.el8.x86_64", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "CRB-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "CRB-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "CRB-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "CRB-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.src", "CRB-8.5.0.GA:gnome-software-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debuginfo-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-debugsource-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.aarch64", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.i686", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.ppc64le", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.s390x", "CRB-8.5.0.GA:gnome-software-devel-0:3.36.1-10.el8.x86_64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.src", "CRB-8.5.0.GA:mutter-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debuginfo-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-debugsource-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-devel-0:3.32.2-60.el8.x86_64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.aarch64", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.i686", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.ppc64le", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.s390x", "CRB-8.5.0.GA:mutter-tests-debuginfo-0:3.32.2-60.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944340" } ], "notes": [ { "category": "description", "text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.src", "AppStream-8.5.0.GA:webkit2gtk3-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-debugsource-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-devel-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-debuginfo-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-0:2.32.3-2.el8.x86_64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.aarch64", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.i686", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.ppc64le", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.s390x", "AppStream-8.5.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.32.3-2.el8.x86_64" ], "known_not_affected": [ "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.src", "AppStream-8.5.0.GA:LibRaw-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-debugsource-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-devel-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.i686", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.ppc64le", "AppStream-8.5.0.GA:LibRaw-samples-debuginfo-0:0.19.5-3.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.src", "AppStream-8.5.0.GA:accountsservice-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-debugsource-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-devel-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.aarch64", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.i686", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.ppc64le", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.s390x", "AppStream-8.5.0.GA:accountsservice-libs-debuginfo-0:0.6.55-2.el8.x86_64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.src", "AppStream-8.5.0.GA:gdm-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debuginfo-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.aarch64", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.i686", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.ppc64le", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.s390x", "AppStream-8.5.0.GA:gdm-debugsource-1:40.0-15.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.src", "AppStream-8.5.0.GA:gnome-autoar-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debuginfo-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.i686", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.s390x", "AppStream-8.5.0.GA:gnome-autoar-debugsource-0:0.2.3-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.src", "AppStream-8.5.0.GA:gnome-calculator-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debuginfo-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.aarch64", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.ppc64le", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.s390x", "AppStream-8.5.0.GA:gnome-calculator-debugsource-0:3.28.2-2.el8.x86_64", "AppStream-8.5.0.GA:gnome-classic-session-0:3.32.1-20.el8.noarch", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.src", "AppStream-8.5.0.GA:gnome-control-center-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debuginfo-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.aarch64", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.ppc64le", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.s390x", "AppStream-8.5.0.GA:gnome-control-center-debugsource-0:3.28.2-28.el8.x86_64", "AppStream-8.5.0.GA:gnome-control-center-filesystem-0:3.28.2-28.el8.noarch", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.src", "AppStream-8.5.0.GA:gnome-online-accounts-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debuginfo-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-debugsource-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.aarch64", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.i686", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.ppc64le", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.s390x", "AppStream-8.5.0.GA:gnome-online-accounts-devel-0:3.28.2-3.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.src", "AppStream-8.5.0.GA:gnome-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debuginfo-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-debugsource-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-kiosk-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-wayland-session-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.aarch64", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.ppc64le", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.s390x", "AppStream-8.5.0.GA:gnome-session-xsession-0:3.28.1-13.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.src", "AppStream-8.5.0.GA:gnome-settings-daemon-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.s390x", "AppStream-8.5.0.GA:gnome-settings-daemon-debuginfo-0:3.32.0-16.el8.x86_64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.aarch64", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.32.0-16.el8.ppc64le", "AppStream-8.5.0.GA:gnome-settings-daemon-debugsource-0:3.